{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "* Miscellaneous Ubuntu changes\n     - update-from-bionic-master repo has been updated\n   * Miscellaneous upstream changes\n     - debian: add control and changeg files\n   [ Ubuntu: 4.15.0-254.265 ]\n   * CVE-2023-53515\n     - virtio-mmio: don't break lifecycle of vm_dev {CVE-2023-53515}\n   * CVE-2025-39967\n     - fbcon: fix integer overflow in fbcon_do_set_font {CVE-2025-39967}\n     - fbcon: Fix OOB access in font allocation {CVE-2025-39967}\n   * CVE-2025-38702\n     - fbdev: fix potential buffer overflow in do_register_framebuffer()\n       {CVE-2025-38702}\n   * CVE-2025-38563\n     - perf/core: Prevent VMA split of buffer mappings {CVE-2025-38563}\n   * CVE-2025-39869\n     - dmaengine: ti: edma: Fix memory allocation size for queue_priority_map\n       {CVE-2025-39869}\n   * CVE-2023-53577\n     - bpf, cpumap: Make sure kthread is running before map update returns\n       {CVE-2023-53577}\n   * CVE-2023-53608\n     - nilfs2: fix potential UAF of struct nilfs_sc_info in nilfs_segctor_thread()\n       {CVE-2023-53608}\n   * CVE-2023-53604\n     - dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path\n       {CVE-2023-53604}\n   * CVE-2023-53619\n     - netfilter: Replace printk() with pr_*() and define pr_fmt() {CVE-2023-53619}\n     - netfilter: use kvmalloc_array to allocate memory for hashtable\n       {CVE-2023-53619}\n     - netfilter: conntrack: Avoid nf_ct_helper_hash uses after free\n       {CVE-2023-53619}\n   * CVE-2025-38680\n     - media: uvcvideo: Fix 1-byte out-of-bounds read in {CVE-2025-38680}\n   * CVE-2023-53454\n     - HID: multitouch: Correct devm device reference for hidinput {CVE-2023-53454}\n   * CVE-2025-38699\n     - scsi: bfa: Double-free fix {CVE-2025-38699}\n     - ubi: ensure that VID header offset + VID header size <= alloc, size\n       {CVE-2023-53265}\n     - scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()\n       {CVE-2023-53676}\n     - fs: jfs: Fix UBSAN: array-index-out-of-bounds in {CVE-2025-38699}\n   * CVE-2023-53596\n     - drivers: base: Free devm resources when unregistering a {CVE-2023-53596}\n   * CVE-2023-53622\n     - gfs2: Fix possible data races in gfs2_show_options() {CVE-2023-53622}\n     - HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver\n       Due to Race Condition {CVE-2023-53622}\n   * CVE-2023-53090\n     - drm/amdkfd: Fix an illegal memory access {CVE-2023-53090}\n   * CVE-2023-53116\n     - nvmet: avoid potential UAF in nvmet_req_complete() {CVE-2023-53116}\n   * CVE-2023-53138\n     - net: caif: Fix use-after-free in cfusbl_device_notify() {CVE-2023-53138}\n   * CVE-2023-53035\n     - nilfs2: fix kernel-infoleak in nilfs_ioctl_wrap_copy() {CVE-2023-53035}\n   * CVE-2023-53668\n     - ring-buffer: Fix deadloop issue on reading trace_pipe {CVE-2023-53668}\n   * CVE-2023-53616\n     - jfs: fix invalid free of JFS_IP(ipimap)->i_imap in diUnmount\n       {CVE-2023-53616}\n   * CVE-2023-53554\n     - staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext()\n       {CVE-2023-53554}\n   * CVE-2023-53587\n     - ring-buffer: Sync IRQ works before buffer destruction {CVE-2023-53587}\n   * CVE-2023-53541\n     - mtd: rawnand: brcmnand: Fix potential out-of-bounds access in oob write\n       {CVE-2023-53541}\n   * CVE-2023-53559\n     - ip_vti: fix potential slab-use-after-free in decode_session6\n       {CVE-2023-53559}\n   * CVE-2023-53484\n     - lib: cpu_rmap: Avoid use after free on rmap->obj array entries\n       {CVE-2023-53484}\n     - lib: cpu_rmap: Fix potential use-after-free in irq_cpu_rmap_release()\n       {CVE-2023-53484}\n   * CVE-2025-39824\n     - HID: asus: fix UAF via HID_CLAIMED_INPUT validation {CVE-2025-39824}\n   * CVE-2025-38715\n     - hfs: fix slab-out-of-bounds in hfs_bnode_read() {CVE-2025-38715}\n   * CVE-2023-53153\n     - wifi: cfg80211: Fix use after free for wext {CVE-2023-53153}\n   * CVE-2025-38555\n     - usb: gadget : fix use-after-free in composite_dev_cleanup() {CVE-2025-38555}\n   * CVE-2025-39743\n     - jfs: truncate good inode pages when hard link is 0 {CVE-2025-39743}\n   * CVE-2025-39945\n     - cnic: Fix use-after-free bugs in cnic_delete_task {CVE-2025-39945}\n   * CVE-2023-53506\n     - udf: Do not bother merging very long extents {CVE-2023-53506}\n   * CVE-2025-38714\n     - hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read() {CVE-2025-38714}\n   * CVE-2025-39685\n     - comedi: pcl726: Prevent invalid irq number {CVE-2025-39685}\n   * CVE-2025-39839\n     - batman-adv: fix OOB read/write in network-coding decode {CVE-2025-39839}\n   * CVE-2025-38708\n     - drbd: add missing kref_get in handle_write_conflicts {CVE-2025-38708}\n   * CVE-2023-53521\n     - scsi: ses: Fix slab-out-of-bounds in ses_intf_remove() {CVE-2023-53521}\n   * CVE-2025-38713\n     - hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() {CVE-2025-38713}\n   * CVE-2023-53675\n     - scsi: ses: Fix possible desc_ptr out-of-bounds accesses {CVE-2023-53675}\n   * CVE-2025-39691\n     - fs/buffer: fix use-after-free when call bh_read() helper {CVE-2025-39691}\n   * CVE-2023-53259\n     - VMCI: check context->notify_page after call to get_user_pages_fast() to\n       avoid GPF {CVE-2023-53259}\n   * CVE-2023-53285\n     - ext4: add bounds checking in get_max_inline_xattr_value_size()\n       {CVE-2023-53285}\n   * CVE-2023-53148\n     - igb: Fix igb_down hung on surprise removal {CVE-2023-53148}\n   * CVE-2023-53219\n     - media: netup_unidvb: fix use-after-free at del_timer() {CVE-2023-53219}\n   * CVE-2023-53215\n     - sched/fair: Don't balance task to its current running CPU {CVE-2023-53215}\n   * CVE-2023-53305\n     - Bluetooth: L2CAP: Fix use-after-free {CVE-2023-53305}\n   * CVE-2025-38103\n     - HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse()\n       {CVE-2025-38103}\n   * CVE-2025-38051\n     - smb: client: Fix use-after-free in cifs_fill_dirent {CVE-2025-38051}\n   * CVE-2025-38157\n     - wifi: ath9k_htc: Abort software beacon handling if disabled {CVE-2025-38157}\n   * CVE-2023-53373\n     - crypto: seqiv - Handle EBUSY correctly {CVE-2023-53373}\n   * CVE-2025-38079\n     - crypto: algif_hash - fix double free in hash_accept {CVE-2025-38079}\n   * CVE-2025-38212\n     - ipc: fix to protect IPCS lookups using RCU {CVE-2025-38212}\n   * CVE-2025-38313\n     - bus: fsl-mc: fix double-free on mc_dev {CVE-2025-38313}\n   * CVE-2023-53311\n     - nilfs2: fix use-after-free of nilfs_root in dirtying inodes via iput\n       {CVE-2023-53311}\n   * CVE-2023-53307\n     - rbd: avoid use-after-free in do_rbd_add() when rbd_dev_create() fails\n       {CVE-2023-53307}\n   * CVE-2025-38403\n     - vsock/vmci: Clear the vmci transport packet properly when initializing it\n       {CVE-2025-38403}\n   * CVE-2025-39683\n     - tracing: Limit access to parser->buffer when trace_get_user failed\n       {CVE-2025-39683}\n   * CVE-2025-38697\n     - jfs: upper bound check of tree index in dbAllocAG {CVE-2025-38697}\n   * CVE-2025-39689\n     - ftrace: Also allocate and copy hash for reading of filter files\n       {CVE-2025-39689}\n   * CVE-2025-38574\n     - pptp: ensure minimal skb length in pptp_xmit() {CVE-2025-38574}\n   * CVE-2025-38572\n     - ipv6: reject malicious packets in ipv6_gso_segment() {CVE-2025-38572}\n   * CVE-2025-38685\n     - fbdev: Fix vmalloc out-of-bounds write in fast_imageblit {CVE-2025-38685}\n   * CVE-2025-39911\n     - i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path\n       {CVE-2025-39911}\n   * CVE-2025-39973\n     - i40e: increase max descriptors for XL710 {CVE-2025-39973}\n     - i40e: add validation for ring_len param {CVE-2025-39973}\n   * CVE-2025-38724\n     - nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()\n       {CVE-2025-38724}\n   * CVE-2025-39860\n     - Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen()\n       {CVE-2025-39860}\n   * CVE-2025-38530\n     - comedi: pcl812: Fix bit shift out of bounds {CVE-2025-38530}\n   * CVE-2025-38529\n     - comedi: aio_iiro_16: Fix bit shift out of bounds {CVE-2025-38529}\n   * CVE-2025-38497\n     - usb: gadget: configfs: Fix OOB read on empty string write {CVE-2025-38497}\n   * CVE-2025-38483\n     - comedi: das16m1: Fix bit shift out of bounds {CVE-2025-38483}\n   * CVE-2025-38482\n     - comedi: das6402: Fix bit shift out of bounds {CVE-2025-38482}\n   * CVE-2025-39702\n     - ipv6: sr: Fix MAC comparison to be constant-time {CVE-2025-39702}\n   * CVE-2025-39730\n     - NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() {CVE-2025-39730}\n   * CVE-2025-39817\n     - efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare {CVE-2025-39817}\n   * CVE-2025-38494\n     - HID: core: ensure the allocated report buffer can contain the reserved\n       report ID {CVE-2025-38494}\n     - HID: core: ensure __hid_request reserves the report ID as the first byte\n       {CVE-2025-38494}\n     - HID: core: do not bypass hid_hw_raw_request {CVE-2025-38494}\n   * CVE-2025-38527\n     - smb: client: fix use-after-free in cifs_oplock_break {CVE-2025-38527}\n   * CVE-2025-39965\n     - xfrm: Duplicate SPI Handling {CVE-2025-39965}\n   * CVE-2025-37927\n     - iommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid\n       {CVE-2025-37927}\n   * CVE-2025-37817\n     - mcb: fix error handling for different scenarios when parsing\n       {CVE-2025-37817}\n     - mcb: fix a double free bug in chameleon_parse_gdd() {CVE-2025-37817}\n   * CVE-2025-38204\n     - jfs: fix array-index-out-of-bounds read in add_missing_indices\n       {CVE-2025-38204}\n   * CVE-2025-38323\n     - net: atm: add lec_mutex {CVE-2025-38323}\n   * CVE-2025-38346\n     - ftrace: Fix UAF when lookup kallsym after ftrace disabled {CVE-2025-38346}\n   * CVE-2025-38348\n     - wifi: p54: prevent buffer-overflow in p54_rx_eeprom_readback()\n       {CVE-2025-38348}\n   * CVE-2025-38416\n     - NFC: nci: uart: Set tty->disc_data only in success path {CVE-2025-38416}\n   * CVE-2025-38428\n     - Input: ims-pcu - check record size in ims_pcu_flash_firmware()\n       {CVE-2025-38428}\n   * CVE-2025-38245\n     - atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister().\n       {CVE-2025-38245}\n   * CVE-2025-38377\n     - rose: fix dangling neighbour pointers in rose_rt_device_down()\n       {CVE-2025-38377}\n   * CVE-2025-38459\n     - atm: clip: Fix infinite recursive call of clip_push(). {CVE-2025-38459}\n   * CVE-2025-39863\n     - wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work\n       {CVE-2025-39863}\n   * CVE-2025-21726\n     - padata: avoid UAF for reorder_work {CVE-2025-21726}\n   * CVE-2025-39760\n     - usb: core: config: Prevent OOB read in SS endpoint companion parsing\n       {CVE-2025-39760}\n   * CVE-2025-38198\n     - fbcon: Make sure modelist not set on unregistered console {CVE-2025-38198}\n   * CVE-2025-38375\n     - virtio-net: ensure the received length does not exceed allocated size\n       {CVE-2025-38375}\n   * CVE-2025-39993\n     - media: imon: reorganize serialization {CVE-2025-39993}\n     - media: rc: fix races with imon_disconnect() {CVE-2025-39993}\n   * CVE-2025-39883\n     - mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison\n       memory {CVE-2025-39883}\n   * Focal update: v5.4.211 upstream stable release (LP: #1990190)\n     - scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user\n       input\n   * Focal update: v5.4.231 upstream stable release (LP: #2011226) //\n     CVE-2023-53000\n     - netlink: prevent potential spectre v1 gadgets\n   * CVE-2022-49980\n     - USB: gadget: Fix use-after-free Read in usb_udc_uevent()\n   * CVE-2022-21546\n     - scsi: target: Fix WRITE_SAME No Data Buffer crash\n   * Focal update: v5.4.225 upstream stable release (LP: #2002347) //\n     CVE-2022-49763\n     - ntfs: fix use-after-free in ntfs_attr_find()\n   * Focal update: Focal update: v5.4.235 upstream stable release\n     (LP: #2017706) // CVE-2022-50258\n     - wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds()\n   * CVE-2025-21727\n     - padata: fix UAF in padata_reorder\n   * CVE-2025-37882\n     - usb: xhci: Fix isochronous Ring Underrun/Overrun event handling\n   * CVE-2025-38250\n     - Bluetooth: hci_core: Fix use-after-free in vhci_flush()\n   * CVE-2025-39751\n     - ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control\n   * CVE-2025-37810\n     - usb: dwc3: gadget: check that event count does not exceed event buffer\n       length\n   * CVE-2025-37839\n     - jbd2: remove wrong sb->s_sequence check\n   * CVE-2025-37892\n     - mtd: inftlcore: Add error check for inftl_read_oob()\n   * CVE-2025-37923\n     - tracing: Fix oob write in trace_seq_to_buffer()\n   * CVE-2024-43883\n     - usb: vhci-hcd: Do not drop references before new references are gained\n   * CVE-2025-37739\n     - f2fs: lost matching-pair of trace in f2fs_truncate_inode_blocks\n     - f2fs: fix to avoid out-of-bounds access in f2fs_truncate_inode_blocks()\n   * CVE-2025-38069\n     - PCI: endpoint: pci-epf-test: Fix double free that causes kernel to oops\n   * CVE-2025-22083\n     - vhost-scsi: Fix handling of multiple calls to vhost_scsi_set_endpoint\n   * Miscellaneous upstream changes\n     - net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too\n     - HID: core: Harden s32ton() against conversion to 0 bits\n     - fbcon: Introduce wrapper for console->fb_info lookup {CVE-2025-38198}\n     - net: atm: fix /proc/net/atm/lec handling {CVE-2025-38323}",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/ubuntu16.04els/advisories/2026/clsa-2026_1773872435.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-03-18T22:45:29Z",
      "generator": {
        "date": "2026-03-18T22:45:29Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1773872435",
      "initial_release_date": "2026-03-18T22:45:29Z",
      "revision_history": [
        {
          "date": "2026-03-18T22:45:29Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "Fix of 114 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Ubuntu 16.04",
                "product": {
                  "name": "Ubuntu 16.04",
                  "product_id": "Ubuntu-16",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Ubuntu"
          }
        ],
        "category": "vendor",
        "name": "Canonical Ltd."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
                "product": {
                  "name": "linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
                  "product_id": "linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-headers-4.15.0-254-tuxcare.els52@4.15.0-254.265~16.04.1?arch=all"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
                "product": {
                  "name": "linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
                  "product_id": "linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-source-4.15.0@4.15.0-254.265~16.04.1?arch=all"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "all"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
                "product": {
                  "name": "linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
                  "product_id": "linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-headers-4.15.0-254-tuxcare.els52-generic@4.15.0-254.265~16.04.1?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
                "product": {
                  "name": "linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
                  "product_id": "linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-tools-4.15.0-254-tuxcare.els52-lowlatency@4.15.0-254.265~16.04.1?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
                "product": {
                  "name": "linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
                  "product_id": "linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-buildinfo-4.15.0-254-tuxcare.els52-generic@4.15.0-254.265~16.04.1?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
                "product": {
                  "name": "linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
                  "product_id": "linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-hwe-tools-4.15.0-254-tuxcare.els52@4.15.0-254.265~16.04.1?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
                "product": {
                  "name": "linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
                  "product_id": "linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency@4.15.0-254.265~16.04.1?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
                "product": {
                  "name": "linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
                  "product_id": "linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-modules-4.15.0-254-tuxcare.els52-lowlatency@4.15.0-254.265~16.04.1?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
                "product": {
                  "name": "linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
                  "product_id": "linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency@4.15.0-254.265~16.04.1?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
                "product": {
                  "name": "linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
                  "product_id": "linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-image-unsigned-4.15.0-254-tuxcare.els52-generic@4.15.0-254.265~16.04.1?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
                "product": {
                  "name": "linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
                  "product_id": "linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-headers-4.15.0-254-tuxcare.els52-lowlatency@4.15.0-254.265~16.04.1?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
                "product": {
                  "name": "linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
                  "product_id": "linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-modules-4.15.0-254-tuxcare.els52-generic@4.15.0-254.265~16.04.1?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
                "product": {
                  "name": "linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
                  "product_id": "linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-tools-4.15.0-254-tuxcare.els52-generic@4.15.0-254.265~16.04.1?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
                "product": {
                  "name": "linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
                  "product_id": "linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52@4.15.0-254.265~16.04.1?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
                "product": {
                  "name": "linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
                  "product_id": "linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-cloud-tools-4.15.0-254-tuxcare.els52-generic@4.15.0-254.265~16.04.1?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
                "product": {
                  "name": "linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
                  "product_id": "linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-modules-extra-4.15.0-254-tuxcare.els52-generic@4.15.0-254.265~16.04.1?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
                "product": {
                  "name": "linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
                  "product_id": "linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency@4.15.0-254.265~16.04.1?arch=amd64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          }
        ],
        "category": "vendor",
        "name": "CloudLinux"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all"
        },
        "product_reference": "linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64"
        },
        "product_reference": "linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        },
        "product_reference": "linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64"
        },
        "product_reference": "linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64"
        },
        "product_reference": "linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        },
        "product_reference": "linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        },
        "product_reference": "linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        },
        "product_reference": "linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all"
        },
        "product_reference": "linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64"
        },
        "product_reference": "linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        },
        "product_reference": "linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64"
        },
        "product_reference": "linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64"
        },
        "product_reference": "linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64"
        },
        "product_reference": "linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64"
        },
        "product_reference": "linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64"
        },
        "product_reference": "linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        },
        "product_reference": "linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-38348",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: p54: prevent buffer-overflow in p54_rx_eeprom_readback()\n\nRobert Morris reported:\n\n|If a malicious USB device pretends to be an Intersil p54 wifi\n|interface and generates an eeprom_readback message with a large\n|eeprom->v1.len, p54_rx_eeprom_readback() will copy data from the\n|message beyond the end of priv->eeprom.\n|\n|static void p54_rx_eeprom_readback(struct p54_common *priv,\n|                                   struct sk_buff *skb)\n|{\n|        struct p54_hdr *hdr = (struct p54_hdr *) skb->data;\n|        struct p54_eeprom_lm86 *eeprom = (struct p54_eeprom_lm86 *) hdr->data;\n|\n|        if (priv->fw_var >= 0x509) {\n|                memcpy(priv->eeprom, eeprom->v2.data,\n|                       le16_to_cpu(eeprom->v2.len));\n|        } else {\n|                memcpy(priv->eeprom, eeprom->v1.data,\n|                       le16_to_cpu(eeprom->v1.len));\n|        }\n| [...]\n\nThe eeprom->v{1,2}.len is set by the driver in p54_download_eeprom().\nThe device is supposed to provide the same length back to the driver.\nBut yes, it's possible (like shown in the report) to alter the value\nto something that causes a crash/panic due to overrun.\n\nThis patch addresses the issue by adding the size to the common device\ncontext, so p54_rx_eeprom_readback no longer relies on possibly tampered\nvalues... That said, it also checks if the \"firmware\" altered the value\nand no longer copies them.\n\nThe one, small saving grace is: Before the driver tries to read the eeprom,\nit needs to upload >a< firmware. the vendor firmware has a proprietary\nlicense and as a reason, it is not present on most distributions by\ndefault.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38348"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0e4dc150423b829c35cbcf399481ca11594fc036",
          "url": "https://git.kernel.org/stable/c/0e4dc150423b829c35cbcf399481ca11594fc036"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/12134f79e53eb56b0b0b7447fa0c512acf6a8422",
          "url": "https://git.kernel.org/stable/c/12134f79e53eb56b0b0b7447fa0c512acf6a8422"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1f7f8168abe8cbe845ab8bb557228d44784a6b57",
          "url": "https://git.kernel.org/stable/c/1f7f8168abe8cbe845ab8bb557228d44784a6b57"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6d05390d20f110de37d051a3e063ef0a542d01fb",
          "url": "https://git.kernel.org/stable/c/6d05390d20f110de37d051a3e063ef0a542d01fb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/714afb4c38edd19a057d519c1f9c5d164b43de94",
          "url": "https://git.kernel.org/stable/c/714afb4c38edd19a057d519c1f9c5d164b43de94"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9701f842031b825e2fd5f22d064166f8f13f6e4d",
          "url": "https://git.kernel.org/stable/c/9701f842031b825e2fd5f22d064166f8f13f6e4d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/da1b9a55ff116cb040528ef664c70a4eec03ae99",
          "url": "https://git.kernel.org/stable/c/da1b9a55ff116cb040528ef664c70a4eec03ae99"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f39b2f8c1549a539846e083790fad396ef6cd802",
          "url": "https://git.kernel.org/stable/c/f39b2f8c1549a539846e083790fad396ef6cd802"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-10T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38572",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: reject malicious packets in ipv6_gso_segment()\n\nsyzbot was able to craft a packet with very long IPv6 extension headers\nleading to an overflow of skb->transport_header.\n\nThis 16bit field has a limited range.\n\nAdd skb_reset_transport_header_careful() helper and use it\nfrom ipv6_gso_segment()\n\nWARNING: CPU: 0 PID: 5871 at ./include/linux/skbuff.h:3032 skb_reset_transport_header include/linux/skbuff.h:3032 [inline]\nWARNING: CPU: 0 PID: 5871 at ./include/linux/skbuff.h:3032 ipv6_gso_segment+0x15e2/0x21e0 net/ipv6/ip6_offload.c:151\nModules linked in:\nCPU: 0 UID: 0 PID: 5871 Comm: syz-executor211 Not tainted 6.16.0-rc6-syzkaller-g7abc678e3084 #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\n RIP: 0010:skb_reset_transport_header include/linux/skbuff.h:3032 [inline]\n RIP: 0010:ipv6_gso_segment+0x15e2/0x21e0 net/ipv6/ip6_offload.c:151\nCall Trace:\n <TASK>\n  skb_mac_gso_segment+0x31c/0x640 net/core/gso.c:53\n  nsh_gso_segment+0x54a/0xe10 net/nsh/nsh.c:110\n  skb_mac_gso_segment+0x31c/0x640 net/core/gso.c:53\n  __skb_gso_segment+0x342/0x510 net/core/gso.c:124\n  skb_gso_segment include/net/gso.h:83 [inline]\n  validate_xmit_skb+0x857/0x11b0 net/core/dev.c:3950\n  validate_xmit_skb_list+0x84/0x120 net/core/dev.c:4000\n  sch_direct_xmit+0xd3/0x4b0 net/sched/sch_generic.c:329\n  __dev_xmit_skb net/core/dev.c:4102 [inline]\n  __dev_queue_xmit+0x17b6/0x3a70 net/core/dev.c:4679",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38572"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/09ff062b89d8e48165247d677d1ca23d6d607e9b",
          "url": "https://git.kernel.org/stable/c/09ff062b89d8e48165247d677d1ca23d6d607e9b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3f638e0b28bde7c3354a0df938ab3a96739455d1",
          "url": "https://git.kernel.org/stable/c/3f638e0b28bde7c3354a0df938ab3a96739455d1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5489e7fc6f8be3062f8cb7e49406de4bfd94db67",
          "url": "https://git.kernel.org/stable/c/5489e7fc6f8be3062f8cb7e49406de4bfd94db67"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/573b8250fc2554761db3bc2bbdbab23789d52d4e",
          "url": "https://git.kernel.org/stable/c/573b8250fc2554761db3bc2bbdbab23789d52d4e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5dc60b2a00ed7629214ac0c48e43f40af2078703",
          "url": "https://git.kernel.org/stable/c/5dc60b2a00ed7629214ac0c48e43f40af2078703"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d45cf1e7d7180256e17c9ce88e32e8061a7887fe",
          "url": "https://git.kernel.org/stable/c/d45cf1e7d7180256e17c9ce88e32e8061a7887fe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/de322cdf600fc9433845a9e944d1ca6b31cfb67e",
          "url": "https://git.kernel.org/stable/c/de322cdf600fc9433845a9e944d1ca6b31cfb67e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ee851768e4b8371ce151fd446d24bf3ae2d18789",
          "url": "https://git.kernel.org/stable/c/ee851768e4b8371ce151fd446d24bf3ae2d18789"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ef05007b403dcc21e701cb1f30d4572ac0a9da20",
          "url": "https://git.kernel.org/stable/c/ef05007b403dcc21e701cb1f30d4572ac0a9da20"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-08-19T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38563",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/core: Prevent VMA split of buffer mappings\n\nThe perf mmap code is careful about mmap()'ing the user page with the\nringbuffer and additionally the auxiliary buffer, when the event supports\nit. Once the first mapping is established, subsequent mapping have to use\nthe same offset and the same size in both cases. The reference counting for\nthe ringbuffer and the auxiliary buffer depends on this being correct.\n\nThough perf does not prevent that a related mapping is split via mmap(2),\nmunmap(2) or mremap(2). A split of a VMA results in perf_mmap_open() calls,\nwhich take reference counts, but then the subsequent perf_mmap_close()\ncalls are not longer fulfilling the offset and size checks. This leads to\nreference count leaks.\n\nAs perf already has the requirement for subsequent mappings to match the\ninitial mapping, the obvious consequence is that VMA splits, caused by\nresizing of a mapping or partial unmapping, have to be prevented.\n\nImplement the vm_operations_struct::may_split() callback and return\nunconditionally -EINVAL.\n\nThat ensures that the mapping offsets and sizes cannot be changed after the\nfact. Remapping to a different fixed address with the same size is still\npossible as it takes the references for the new mapping and drops those of\nthe old mapping.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38563"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3bd518cc7ea61076bcd725e36ff0e690754977c0",
          "url": "https://git.kernel.org/stable/c/3bd518cc7ea61076bcd725e36ff0e690754977c0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/65311aad4c808bedad0c05d9bb8b06c47dae73eb",
          "url": "https://git.kernel.org/stable/c/65311aad4c808bedad0c05d9bb8b06c47dae73eb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6757a31a8e295ae4f01717a954afda173f25a121",
          "url": "https://git.kernel.org/stable/c/6757a31a8e295ae4f01717a954afda173f25a121"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7b84cb58d1f0aa07656802eae24689566e5f5b1b",
          "url": "https://git.kernel.org/stable/c/7b84cb58d1f0aa07656802eae24689566e5f5b1b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b024d7b56c77191cde544f838debb7f8451cd0d6",
          "url": "https://git.kernel.org/stable/c/b024d7b56c77191cde544f838debb7f8451cd0d6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d52451a9210f2e5a079ba052918c93563518a9ff",
          "url": "https://git.kernel.org/stable/c/d52451a9210f2e5a079ba052918c93563518a9ff"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e4346ffec2c44d6b0be834d59b20632b5bb5729e",
          "url": "https://git.kernel.org/stable/c/e4346ffec2c44d6b0be834d59b20632b5bb5729e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e529888b7e8092912dd8789bdfc76685ccd2ff5f",
          "url": "https://git.kernel.org/stable/c/e529888b7e8092912dd8789bdfc76685ccd2ff5f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ff668930871e0198c7f4e325058b8b7c286787bd",
          "url": "https://git.kernel.org/stable/c/ff668930871e0198c7f4e325058b8b7c286787bd"
        },
        {
          "category": "external",
          "summary": "https://www.zerodayinitiative.com/advisories/ZDI-25-873/",
          "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-873/"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-08-19T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39730",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Fix filehandle bounds checking in nfs_fh_to_dentry()\n\nThe function needs to check the minimal filehandle length before it can\naccess the embedded filehandle.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39730"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/12ad3def2e5e0b120e3d0cb6ce8b7b796819ad40",
          "url": "https://git.kernel.org/stable/c/12ad3def2e5e0b120e3d0cb6ce8b7b796819ad40"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2ad40b7992aa26bc631afc1a995b0e3ddc30de3f",
          "url": "https://git.kernel.org/stable/c/2ad40b7992aa26bc631afc1a995b0e3ddc30de3f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3570ef5c31314c13274c935a20b91768ab5bf412",
          "url": "https://git.kernel.org/stable/c/3570ef5c31314c13274c935a20b91768ab5bf412"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/763810bb883cb4de412a72f338d80947d97df67b",
          "url": "https://git.kernel.org/stable/c/763810bb883cb4de412a72f338d80947d97df67b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7dd36f7477d1e03a1fcf8d13531ca326c4fb599f",
          "url": "https://git.kernel.org/stable/c/7dd36f7477d1e03a1fcf8d13531ca326c4fb599f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7f8eca87fef7519e9c41f3258f25ebc2752247ee",
          "url": "https://git.kernel.org/stable/c/7f8eca87fef7519e9c41f3258f25ebc2752247ee"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b7f7866932466332a2528fda099000b035303485",
          "url": "https://git.kernel.org/stable/c/b7f7866932466332a2528fda099000b035303485"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cb09afa0948d96b1e385d609ed044bb1aa043536",
          "url": "https://git.kernel.org/stable/c/cb09afa0948d96b1e385d609ed044bb1aa043536"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ef93a685e01a281b5e2a25ce4e3428cf9371a205",
          "url": "https://git.kernel.org/stable/c/ef93a685e01a281b5e2a25ce4e3428cf9371a205"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-07T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39689",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Also allocate and copy hash for reading of filter files\n\nCurrently the reader of set_ftrace_filter and set_ftrace_notrace just adds\nthe pointer to the global tracer hash to its iterator. Unlike the writer\nthat allocates a copy of the hash, the reader keeps the pointer to the\nfilter hashes. This is problematic because this pointer is static across\nfunction calls that release the locks that can update the global tracer\nhashes. This can cause UAF and similar bugs.\n\nAllocate and copy the hash for reading the filter files like it is done\nfor the writers. This not only fixes UAF bugs, but also makes the code a\nbit simpler as it doesn't have to differentiate when to free the\niterator's hash between writers and readers.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39689"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/12064e1880fc9202be75ff668205b1703d92f74f",
          "url": "https://git.kernel.org/stable/c/12064e1880fc9202be75ff668205b1703d92f74f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3b114a3282ab1a12cb4618a8f45db5d7185e784a",
          "url": "https://git.kernel.org/stable/c/3b114a3282ab1a12cb4618a8f45db5d7185e784a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/64db338140d2bad99a0a8c6a118dd60b3e1fb8cb",
          "url": "https://git.kernel.org/stable/c/64db338140d2bad99a0a8c6a118dd60b3e1fb8cb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a40c69f4f1ed96acbcd62e9b5ff3a596f0a91309",
          "url": "https://git.kernel.org/stable/c/a40c69f4f1ed96acbcd62e9b5ff3a596f0a91309"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bfb336cf97df7b37b2b2edec0f69773e06d11955",
          "url": "https://git.kernel.org/stable/c/bfb336cf97df7b37b2b2edec0f69773e06d11955"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c4cd93811e038d19f961985735ef7bb128078dfb",
          "url": "https://git.kernel.org/stable/c/c4cd93811e038d19f961985735ef7bb128078dfb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c591ba1acd081d4980713e47869dd1cc3d963d19",
          "url": "https://git.kernel.org/stable/c/c591ba1acd081d4980713e47869dd1cc3d963d19"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e0b6b223167e1edde5c82edf38e393c06eda1f13",
          "url": "https://git.kernel.org/stable/c/e0b6b223167e1edde5c82edf38e393c06eda1f13"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-05T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38377",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrose: fix dangling neighbour pointers in rose_rt_device_down()\n\nThere are two bugs in rose_rt_device_down() that can cause\nuse-after-free:\n\n1. The loop bound `t->count` is modified within the loop, which can\n   cause the loop to terminate early and miss some entries.\n\n2. When removing an entry from the neighbour array, the subsequent entries\n   are moved up to fill the gap, but the loop index `i` is still\n   incremented, causing the next entry to be skipped.\n\nFor example, if a node has three neighbours (A, A, B) with count=3 and A\nis being removed, the second A is not checked.\n\n    i=0: (A, A, B) -> (A, B) with count=2\n          ^ checked\n    i=1: (A, B)    -> (A, B) with count=2\n             ^ checked (B, not A!)\n    i=2: (doesn't occur because i < count is false)\n\nThis leaves the second A in the array with count=2, but the rose_neigh\nstructure has been freed. Code that accesses these entries assumes that\nthe first `count` entries are valid pointers, causing a use-after-free\nwhen it accesses the dangling pointer.\n\nFix both issues by iterating over the array in reverse order with a fixed\nloop bound. This ensures that all entries are examined and that the removal\nof an entry doesn't affect subsequent iterations.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38377"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2b952dbb32fef835756f07ff0cd77efbb836dfea",
          "url": "https://git.kernel.org/stable/c/2b952dbb32fef835756f07ff0cd77efbb836dfea"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2c6c82ee074bfcfd1bc978ec45bfea37703d840a",
          "url": "https://git.kernel.org/stable/c/2c6c82ee074bfcfd1bc978ec45bfea37703d840a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/34a500caf48c47d5171f4aa1f237da39b07c6157",
          "url": "https://git.kernel.org/stable/c/34a500caf48c47d5171f4aa1f237da39b07c6157"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/446ac00b86be1670838e513b643933d78837d8db",
          "url": "https://git.kernel.org/stable/c/446ac00b86be1670838e513b643933d78837d8db"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7a1841c9609377e989ec41c16551309ce79c39e4",
          "url": "https://git.kernel.org/stable/c/7a1841c9609377e989ec41c16551309ce79c39e4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/94e0918e39039c47ddceb609500817f7266be756",
          "url": "https://git.kernel.org/stable/c/94e0918e39039c47ddceb609500817f7266be756"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b6b232e16e08c6dc120672b4753392df0d28c1b4",
          "url": "https://git.kernel.org/stable/c/b6b232e16e08c6dc120672b4753392df0d28c1b4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fe62a35fb1f77f494ed534fc69a9043dc5a30ce1",
          "url": "https://git.kernel.org/stable/c/fe62a35fb1f77f494ed534fc69a9043dc5a30ce1"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-25T13:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53454",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: multitouch: Correct devm device reference for hidinput input_dev name\n\nReference the HID device rather than the input device for the devm\nallocation of the input_dev name. Referencing the input_dev would lead to a\nuse-after-free when the input_dev was unregistered and subsequently fires a\nuevent that depends on the name. At the point of firing the uevent, the\nname would be freed by devres management.\n\nUse devm_kasprintf to simplify the logic for allocating memory and\nformatting the input_dev name string.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53454"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/15ec7cb55e7d88755aa01d44a7a1015a42bfce86",
          "url": "https://git.kernel.org/stable/c/15ec7cb55e7d88755aa01d44a7a1015a42bfce86"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1d7833db9fd118415dace2ca157bfa603dec9c8c",
          "url": "https://git.kernel.org/stable/c/1d7833db9fd118415dace2ca157bfa603dec9c8c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2763732ec1e68910719c75b6b896e11b6d3d622b",
          "url": "https://git.kernel.org/stable/c/2763732ec1e68910719c75b6b896e11b6d3d622b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/39c70c19456e50dcb3abfe53539220dff0490f1d",
          "url": "https://git.kernel.org/stable/c/39c70c19456e50dcb3abfe53539220dff0490f1d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4794394635293a3e74591351fff469cea7ad15a2",
          "url": "https://git.kernel.org/stable/c/4794394635293a3e74591351fff469cea7ad15a2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ac0d389402a6ff9ad92cea02c2d8c711483b91ab",
          "url": "https://git.kernel.org/stable/c/ac0d389402a6ff9ad92cea02c2d8c711483b91ab"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b70ac7849248ec8128fa12f86e3655ba38838f29",
          "url": "https://git.kernel.org/stable/c/b70ac7849248ec8128fa12f86e3655ba38838f29"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dde88ab4e45beb60b217026207aa9c14c88d71ab",
          "url": "https://git.kernel.org/stable/c/dde88ab4e45beb60b217026207aa9c14c88d71ab"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/df7ca43fe090e1a56c216c8ebc106ef5fd49afc6",
          "url": "https://git.kernel.org/stable/c/df7ca43fe090e1a56c216c8ebc106ef5fd49afc6"
        }
      ],
      "release_date": "2025-10-01T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39911",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path\n\nIf request_irq() in i40e_vsi_request_irq_msix() fails in an iteration\nlater than the first, the error path wants to free the IRQs requested\nso far. However, it uses the wrong dev_id argument for free_irq(), so\nit does not free the IRQs correctly and instead triggers the warning:\n\n Trying to free already-free IRQ 173\n WARNING: CPU: 25 PID: 1091 at kernel/irq/manage.c:1829 __free_irq+0x192/0x2c0\n Modules linked in: i40e(+) [...]\n CPU: 25 UID: 0 PID: 1091 Comm: NetworkManager Not tainted 6.17.0-rc1+ #1 PREEMPT(lazy)\n Hardware name: [...]\n RIP: 0010:__free_irq+0x192/0x2c0\n [...]\n Call Trace:\n  <TASK>\n  free_irq+0x32/0x70\n  i40e_vsi_request_irq_msix.cold+0x63/0x8b [i40e]\n  i40e_vsi_request_irq+0x79/0x80 [i40e]\n  i40e_vsi_open+0x21f/0x2f0 [i40e]\n  i40e_open+0x63/0x130 [i40e]\n  __dev_open+0xfc/0x210\n  __dev_change_flags+0x1fc/0x240\n  netif_change_flags+0x27/0x70\n  do_setlink.isra.0+0x341/0xc70\n  rtnl_newlink+0x468/0x860\n  rtnetlink_rcv_msg+0x375/0x450\n  netlink_rcv_skb+0x5c/0x110\n  netlink_unicast+0x288/0x3c0\n  netlink_sendmsg+0x20d/0x430\n  ____sys_sendmsg+0x3a2/0x3d0\n  ___sys_sendmsg+0x99/0xe0\n  __sys_sendmsg+0x8a/0xf0\n  do_syscall_64+0x82/0x2c0\n  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n  [...]\n  </TASK>\n ---[ end trace 0000000000000000 ]---\n\nUse the same dev_id for free_irq() as for request_irq().\n\nI tested this with inserting code to fail intentionally.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39911"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/13ab9adef3cd386511c930a9660ae06595007f89",
          "url": "https://git.kernel.org/stable/c/13ab9adef3cd386511c930a9660ae06595007f89"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/23431998a37764c464737b855c71a81d50992e98",
          "url": "https://git.kernel.org/stable/c/23431998a37764c464737b855c71a81d50992e98"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6e4016c0dca53afc71e3b99e24252b63417395df",
          "url": "https://git.kernel.org/stable/c/6e4016c0dca53afc71e3b99e24252b63417395df"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/915470e1b44e71d1dd07ee067276f003c3521ee3",
          "url": "https://git.kernel.org/stable/c/915470e1b44e71d1dd07ee067276f003c3521ee3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a30afd6617c30aaa338d1dbcb1e34e7a1890085c",
          "url": "https://git.kernel.org/stable/c/a30afd6617c30aaa338d1dbcb1e34e7a1890085c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b905b2acb3a0bbb08ad9be9984d8cdabdf827315",
          "url": "https://git.kernel.org/stable/c/b905b2acb3a0bbb08ad9be9984d8cdabdf827315"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b9721a023df38cf44a88f2739b4cf51efd051f85",
          "url": "https://git.kernel.org/stable/c/b9721a023df38cf44a88f2739b4cf51efd051f85"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c62580674ce5feb1be4f90b5873ff3ce50e0a1db",
          "url": "https://git.kernel.org/stable/c/c62580674ce5feb1be4f90b5873ff3ce50e0a1db"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-10-01T08:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53622",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Fix possible data races in gfs2_show_options()\n\nSome fields such as gt_logd_secs of the struct gfs2_tune are accessed\nwithout holding the lock gt_spin in gfs2_show_options():\n\n  val = sdp->sd_tune.gt_logd_secs;\n  if (val != 30)\n    seq_printf(s, \",commit=%d\", val);\n\nAnd thus can cause data races when gfs2_show_options() and other functions\nsuch as gfs2_reconfigure() are concurrently executed:\n\n  spin_lock(&gt->gt_spin);\n  gt->gt_logd_secs = newargs->ar_commit;\n\nTo fix these possible data races, the lock sdp->sd_tune.gt_spin is\nacquired before accessing the fields of gfs2_tune and released after these\naccesses.\n\nFurther changes by Andreas:\n\n- Don't hold the spin lock over the seq_printf operations.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53622"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/235a5ae73cea29109a3e06f100493f17857e6a93",
          "url": "https://git.kernel.org/stable/c/235a5ae73cea29109a3e06f100493f17857e6a93"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/42077d4de49e4d9c773c97c42d5383b4899a8f9d",
          "url": "https://git.kernel.org/stable/c/42077d4de49e4d9c773c97c42d5383b4899a8f9d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6fa0a72cbbe45db4ed967a51f9e6f4e3afe61d20",
          "url": "https://git.kernel.org/stable/c/6fa0a72cbbe45db4ed967a51f9e6f4e3afe61d20"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7c5b2649f6a37d45bfb7abf34c9b71d08677139f",
          "url": "https://git.kernel.org/stable/c/7c5b2649f6a37d45bfb7abf34c9b71d08677139f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7e5bbeb7eb813bb2568e1d5d02587df943272e57",
          "url": "https://git.kernel.org/stable/c/7e5bbeb7eb813bb2568e1d5d02587df943272e57"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/85e888150075cb221270b64bf772341fc6bd11d9",
          "url": "https://git.kernel.org/stable/c/85e888150075cb221270b64bf772341fc6bd11d9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a4f71523ed2123d63b431cc0cea4e9f363a0f054",
          "url": "https://git.kernel.org/stable/c/a4f71523ed2123d63b431cc0cea4e9f363a0f054"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b4a7ab57effbed42624842f2ab2a49b177c21a47",
          "url": "https://git.kernel.org/stable/c/b4a7ab57effbed42624842f2ab2a49b177c21a47"
        }
      ],
      "release_date": "2025-10-07T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39797",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm: Duplicate SPI Handling\n\nThe issue originates when Strongswan initiates an XFRM_MSG_ALLOCSPI\nNetlink message, which triggers the kernel function xfrm_alloc_spi().\nThis function is expected to ensure uniqueness of the Security Parameter\nIndex (SPI) for inbound Security Associations (SAs). However, it can\nreturn success even when the requested SPI is already in use, leading\nto duplicate SPIs assigned to multiple inbound SAs, differentiated\nonly by their destination addresses.\n\nThis behavior causes inconsistencies during SPI lookups for inbound packets.\nSince the lookup may return an arbitrary SA among those with the same SPI,\npacket processing can fail, resulting in packet drops.\n\nAccording to RFC 4301 section 4.4.2 , for inbound processing a unicast SA\nis uniquely identified by the SPI and optionally protocol.\n\nReproducing the Issue Reliably:\nTo consistently reproduce the problem, restrict the available SPI range in\ncharon.conf : spi_min = 0x10000000 spi_max = 0x10000002\nThis limits the system to only 2 usable SPI values.\nNext, create more than 2 Child SA. each using unique pair of src/dst address.\nAs soon as the 3rd Child SA is initiated, it will be assigned a duplicate\nSPI, since the SPI pool is already exhausted.\nWith a narrow SPI range, the issue is consistently reproducible.\nWith a broader/default range, it becomes rare and unpredictable.\n\nCurrent implementation:\nxfrm_spi_hash() lookup function computes hash using daddr, proto, and family.\nSo if two SAs have the same SPI but different destination addresses, then\nthey will:\na. Hash into different buckets\nb. Be stored in different linked lists (byspi + h)\nc. Not be seen in the same hlist_for_each_entry_rcu() iteration.\nAs a result, the lookup will result in NULL and kernel allows that Duplicate SPI\n\nProposed Change:\nxfrm_state_lookup_spi_proto() does a truly global search - across all states,\nregardless of hash bucket and matches SPI and proto.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39797"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/29e9158f91f99057dbd35db5e8674d93b38549fe",
          "url": "https://git.kernel.org/stable/c/29e9158f91f99057dbd35db5e8674d93b38549fe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2fc5b54368a1bf1d2d74b4d3b8eea5309a653e38",
          "url": "https://git.kernel.org/stable/c/2fc5b54368a1bf1d2d74b4d3b8eea5309a653e38"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3d8090bb53424432fa788fe9a49e8ceca74f0544",
          "url": "https://git.kernel.org/stable/c/3d8090bb53424432fa788fe9a49e8ceca74f0544"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/94f39804d891cffe4ce17737d295f3b195bc7299",
          "url": "https://git.kernel.org/stable/c/94f39804d891cffe4ce17737d295f3b195bc7299"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c67d4e7a8f90fb6361ca89d4d5c9a28f4e935e47",
          "url": "https://git.kernel.org/stable/c/c67d4e7a8f90fb6361ca89d4d5c9a28f4e935e47"
        }
      ],
      "release_date": "2025-09-12T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53215",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/fair: Don't balance task to its current running CPU\n\nWe've run into the case that the balancer tries to balance a migration\ndisabled task and trigger the warning in set_task_cpu() like below:\n\n ------------[ cut here ]------------\n WARNING: CPU: 7 PID: 0 at kernel/sched/core.c:3115 set_task_cpu+0x188/0x240\n Modules linked in: hclgevf xt_CHECKSUM ipt_REJECT nf_reject_ipv4 <...snip>\n CPU: 7 PID: 0 Comm: swapper/7 Kdump: loaded Tainted: G           O       6.1.0-rc4+ #1\n Hardware name: Huawei TaiShan 2280 V2/BC82AMDC, BIOS 2280-V2 CS V5.B221.01 12/09/2021\n pstate: 604000c9 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : set_task_cpu+0x188/0x240\n lr : load_balance+0x5d0/0xc60\n sp : ffff80000803bc70\n x29: ffff80000803bc70 x28: ffff004089e190e8 x27: ffff004089e19040\n x26: ffff007effcabc38 x25: 0000000000000000 x24: 0000000000000001\n x23: ffff80000803be84 x22: 000000000000000c x21: ffffb093e79e2a78\n x20: 000000000000000c x19: ffff004089e19040 x18: 0000000000000000\n x17: 0000000000001fad x16: 0000000000000030 x15: 0000000000000000\n x14: 0000000000000003 x13: 0000000000000000 x12: 0000000000000000\n x11: 0000000000000001 x10: 0000000000000400 x9 : ffffb093e4cee530\n x8 : 00000000fffffffe x7 : 0000000000ce168a x6 : 000000000000013e\n x5 : 00000000ffffffe1 x4 : 0000000000000001 x3 : 0000000000000b2a\n x2 : 0000000000000b2a x1 : ffffb093e6d6c510 x0 : 0000000000000001\n Call trace:\n  set_task_cpu+0x188/0x240\n  load_balance+0x5d0/0xc60\n  rebalance_domains+0x26c/0x380\n  _nohz_idle_balance.isra.0+0x1e0/0x370\n  run_rebalance_domains+0x6c/0x80\n  __do_softirq+0x128/0x3d8\n  ____do_softirq+0x18/0x24\n  call_on_irq_stack+0x2c/0x38\n  do_softirq_own_stack+0x24/0x3c\n  __irq_exit_rcu+0xcc/0xf4\n  irq_exit_rcu+0x18/0x24\n  el1_interrupt+0x4c/0xe4\n  el1h_64_irq_handler+0x18/0x2c\n  el1h_64_irq+0x74/0x78\n  arch_cpu_idle+0x18/0x4c\n  default_idle_call+0x58/0x194\n  do_idle+0x244/0x2b0\n  cpu_startup_entry+0x30/0x3c\n  secondary_start_kernel+0x14c/0x190\n  __secondary_switched+0xb0/0xb4\n ---[ end trace 0000000000000000 ]---\n\nFurther investigation shows that the warning is superfluous, the migration\ndisabled task is just going to be migrated to its current running CPU.\nThis is because that on load balance if the dst_cpu is not allowed by the\ntask, we'll re-select a new_dst_cpu as a candidate. If no task can be\nbalanced to dst_cpu we'll try to balance the task to the new_dst_cpu\ninstead. In this case when the migration disabled task is not on CPU it\nonly allows to run on its current CPU, load balance will select its\ncurrent CPU as new_dst_cpu and later triggers the warning above.\n\nThe new_dst_cpu is chosen from the env->dst_grpmask. Currently it\ncontains CPUs in sched_group_span() and if we have overlapped groups it's\npossible to run into this case. This patch makes env->dst_grpmask of\ngroup_balance_mask() which exclude any CPUs from the busiest group and\nsolve the issue. For balancing in a domain with no overlapped groups\nthe behaviour keeps same as before.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53215"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de",
          "url": "https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54",
          "url": "https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15",
          "url": "https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd",
          "url": "https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68",
          "url": "https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc",
          "url": "https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab",
          "url": "https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1",
          "url": "https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1"
        }
      ],
      "release_date": "2025-09-15T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53035",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix kernel-infoleak in nilfs_ioctl_wrap_copy()\n\nThe ioctl helper function nilfs_ioctl_wrap_copy(), which exchanges a\nmetadata array to/from user space, may copy uninitialized buffer regions\nto user space memory for read-only ioctl commands NILFS_IOCTL_GET_SUINFO\nand NILFS_IOCTL_GET_CPINFO.\n\nThis can occur when the element size of the user space metadata given by\nthe v_size member of the argument nilfs_argv structure is larger than the\nsize of the metadata element (nilfs_suinfo structure or nilfs_cpinfo\nstructure) on the file system side.\n\nKMSAN-enabled kernels detect this issue as follows:\n\n BUG: KMSAN: kernel-infoleak in instrument_copy_to_user\n include/linux/instrumented.h:121 [inline]\n BUG: KMSAN: kernel-infoleak in _copy_to_user+0xc0/0x100 lib/usercopy.c:33\n  instrument_copy_to_user include/linux/instrumented.h:121 [inline]\n  _copy_to_user+0xc0/0x100 lib/usercopy.c:33\n  copy_to_user include/linux/uaccess.h:169 [inline]\n  nilfs_ioctl_wrap_copy+0x6fa/0xc10 fs/nilfs2/ioctl.c:99\n  nilfs_ioctl_get_info fs/nilfs2/ioctl.c:1173 [inline]\n  nilfs_ioctl+0x2402/0x4450 fs/nilfs2/ioctl.c:1290\n  nilfs_compat_ioctl+0x1b8/0x200 fs/nilfs2/ioctl.c:1343\n  __do_compat_sys_ioctl fs/ioctl.c:968 [inline]\n  __se_compat_sys_ioctl+0x7dd/0x1000 fs/ioctl.c:910\n  __ia32_compat_sys_ioctl+0x93/0xd0 fs/ioctl.c:910\n  do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline]\n  __do_fast_syscall_32+0xa2/0x100 arch/x86/entry/common.c:178\n  do_fast_syscall_32+0x37/0x80 arch/x86/entry/common.c:203\n  do_SYSENTER_32+0x1f/0x30 arch/x86/entry/common.c:246\n  entry_SYSENTER_compat_after_hwframe+0x70/0x82\n\n Uninit was created at:\n  __alloc_pages+0x9f6/0xe90 mm/page_alloc.c:5572\n  alloc_pages+0xab0/0xd80 mm/mempolicy.c:2287\n  __get_free_pages+0x34/0xc0 mm/page_alloc.c:5599\n  nilfs_ioctl_wrap_copy+0x223/0xc10 fs/nilfs2/ioctl.c:74\n  nilfs_ioctl_get_info fs/nilfs2/ioctl.c:1173 [inline]\n  nilfs_ioctl+0x2402/0x4450 fs/nilfs2/ioctl.c:1290\n  nilfs_compat_ioctl+0x1b8/0x200 fs/nilfs2/ioctl.c:1343\n  __do_compat_sys_ioctl fs/ioctl.c:968 [inline]\n  __se_compat_sys_ioctl+0x7dd/0x1000 fs/ioctl.c:910\n  __ia32_compat_sys_ioctl+0x93/0xd0 fs/ioctl.c:910\n  do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline]\n  __do_fast_syscall_32+0xa2/0x100 arch/x86/entry/common.c:178\n  do_fast_syscall_32+0x37/0x80 arch/x86/entry/common.c:203\n  do_SYSENTER_32+0x1f/0x30 arch/x86/entry/common.c:246\n  entry_SYSENTER_compat_after_hwframe+0x70/0x82\n\n Bytes 16-127 of 3968 are uninitialized\n ...\n\nThis eliminates the leak issue by initializing the page allocated as\nbuffer using get_zeroed_page().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53035"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/003587000276f81d0114b5ce773d80c119d8cb30",
          "url": "https://git.kernel.org/stable/c/003587000276f81d0114b5ce773d80c119d8cb30"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5bb105cc72beb9d51bf12f5c657336d2d35bdc5d",
          "url": "https://git.kernel.org/stable/c/5bb105cc72beb9d51bf12f5c657336d2d35bdc5d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5f33b042f74fc9662eba17f4cd19b07d84bbc6c5",
          "url": "https://git.kernel.org/stable/c/5f33b042f74fc9662eba17f4cd19b07d84bbc6c5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8a6550b365c0ce2e65905de57dcbfe1f7d629726",
          "url": "https://git.kernel.org/stable/c/8a6550b365c0ce2e65905de57dcbfe1f7d629726"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8f5cbf6a8c0e19b062b829c5b7aca01468bb57f6",
          "url": "https://git.kernel.org/stable/c/8f5cbf6a8c0e19b062b829c5b7aca01468bb57f6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9c5034e9a0e03db8d5e9eabb176340259b5b97e4",
          "url": "https://git.kernel.org/stable/c/9c5034e9a0e03db8d5e9eabb176340259b5b97e4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a94932381e8dae4117e9129b3c1282e18aa97b05",
          "url": "https://git.kernel.org/stable/c/a94932381e8dae4117e9129b3c1282e18aa97b05"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d18db946cc6a394291539e030df32324285648f7",
          "url": "https://git.kernel.org/stable/c/d18db946cc6a394291539e030df32324285648f7"
        }
      ],
      "release_date": "2025-05-02T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39883",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory\n\nWhen I did memory failure tests, below panic occurs:\n\npage dumped because: VM_BUG_ON_PAGE(PagePoisoned(page))\nkernel BUG at include/linux/page-flags.h:616!\nOops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\nCPU: 3 PID: 720 Comm: bash Not tainted 6.10.0-rc1-00195-g148743902568 #40\nRIP: 0010:unpoison_memory+0x2f3/0x590\nRSP: 0018:ffffa57fc8787d60 EFLAGS: 00000246\nRAX: 0000000000000037 RBX: 0000000000000009 RCX: ffff9be25fcdc9c8\nRDX: 0000000000000000 RSI: 0000000000000027 RDI: ffff9be25fcdc9c0\nRBP: 0000000000300000 R08: ffffffffb4956f88 R09: 0000000000009ffb\nR10: 0000000000000284 R11: ffffffffb4926fa0 R12: ffffe6b00c000000\nR13: ffff9bdb453dfd00 R14: 0000000000000000 R15: fffffffffffffffe\nFS:  00007f08f04e4740(0000) GS:ffff9be25fcc0000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000564787a30410 CR3: 000000010d4e2000 CR4: 00000000000006f0\nCall Trace:\n <TASK>\n unpoison_memory+0x2f3/0x590\n simple_attr_write_xsigned.constprop.0.isra.0+0xb3/0x110\n debugfs_attr_write+0x42/0x60\n full_proxy_write+0x5b/0x80\n vfs_write+0xd5/0x540\n ksys_write+0x64/0xe0\n do_syscall_64+0xb9/0x1d0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f08f0314887\nRSP: 002b:00007ffece710078 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 0000000000000009 RCX: 00007f08f0314887\nRDX: 0000000000000009 RSI: 0000564787a30410 RDI: 0000000000000001\nRBP: 0000564787a30410 R08: 000000000000fefe R09: 000000007fffffff\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009\nR13: 00007f08f041b780 R14: 00007f08f0417600 R15: 00007f08f0416a00\n </TASK>\nModules linked in: hwpoison_inject\n---[ end trace 0000000000000000 ]---\nRIP: 0010:unpoison_memory+0x2f3/0x590\nRSP: 0018:ffffa57fc8787d60 EFLAGS: 00000246\nRAX: 0000000000000037 RBX: 0000000000000009 RCX: ffff9be25fcdc9c8\nRDX: 0000000000000000 RSI: 0000000000000027 RDI: ffff9be25fcdc9c0\nRBP: 0000000000300000 R08: ffffffffb4956f88 R09: 0000000000009ffb\nR10: 0000000000000284 R11: ffffffffb4926fa0 R12: ffffe6b00c000000\nR13: ffff9bdb453dfd00 R14: 0000000000000000 R15: fffffffffffffffe\nFS:  00007f08f04e4740(0000) GS:ffff9be25fcc0000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000564787a30410 CR3: 000000010d4e2000 CR4: 00000000000006f0\nKernel panic - not syncing: Fatal exception\nKernel Offset: 0x31c00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)\n---[ end Kernel panic - not syncing: Fatal exception ]---\n\nThe root cause is that unpoison_memory() tries to check the PG_HWPoison\nflags of an uninitialized page.  So VM_BUG_ON_PAGE(PagePoisoned(page)) is\ntriggered.  This can be reproduced by below steps:\n\n1.Offline memory block:\n\n echo offline > /sys/devices/system/memory/memory12/state\n\n2.Get offlined memory pfn:\n\n page-types -b n -rlN\n\n3.Write pfn to unpoison-pfn\n\n echo <pfn> > /sys/kernel/debug/hwpoison/unpoison-pfn\n\nThis scenario can be identified by pfn_to_online_page() returning NULL. \nAnd ZONE_DEVICE pages are never expected, so we can simply fail if\npfn_to_online_page() == NULL to fix the bug.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39883"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3d278e89c2ea62b1aaa4b0d8a9766a35b3a3164a",
          "url": "https://git.kernel.org/stable/c/3d278e89c2ea62b1aaa4b0d8a9766a35b3a3164a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/63a327a2375a8ce7a47dec5aaa4d8a9ae0a00b96",
          "url": "https://git.kernel.org/stable/c/63a327a2375a8ce7a47dec5aaa4d8a9ae0a00b96"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7618fd443aa4cfa553a64cacf5721581653ee7b0",
          "url": "https://git.kernel.org/stable/c/7618fd443aa4cfa553a64cacf5721581653ee7b0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8e01ea186a52c90694c08a9ff57bea1b0e78256a",
          "url": "https://git.kernel.org/stable/c/8e01ea186a52c90694c08a9ff57bea1b0e78256a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/99f7048957f5ae3cee1c01189147e73a9a96de02",
          "url": "https://git.kernel.org/stable/c/99f7048957f5ae3cee1c01189147e73a9a96de02"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d613f53c83ec47089c4e25859d5e8e0359f6f8da",
          "url": "https://git.kernel.org/stable/c/d613f53c83ec47089c4e25859d5e8e0359f6f8da"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e4ec6def5643a1c9511115b3884eb879572294c6",
          "url": "https://git.kernel.org/stable/c/e4ec6def5643a1c9511115b3884eb879572294c6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fb65803ccff37cf9123c50c1c02efd1ed73c4ed5",
          "url": "https://git.kernel.org/stable/c/fb65803ccff37cf9123c50c1c02efd1ed73c4ed5"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-23T06:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53148",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigb: Fix igb_down hung on surprise removal\n\nIn a setup where a Thunderbolt hub connects to Ethernet and a display\nthrough USB Type-C, users may experience a hung task timeout when they\nremove the cable between the PC and the Thunderbolt hub.\nThis is because the igb_down function is called multiple times when\nthe Thunderbolt hub is unplugged. For example, the igb_io_error_detected\ntriggers the first call, and the igb_remove triggers the second call.\nThe second call to igb_down will block at napi_synchronize.\nHere's the call trace:\n    __schedule+0x3b0/0xddb\n    ? __mod_timer+0x164/0x5d3\n    schedule+0x44/0xa8\n    schedule_timeout+0xb2/0x2a4\n    ? run_local_timers+0x4e/0x4e\n    msleep+0x31/0x38\n    igb_down+0x12c/0x22a [igb 6615058754948bfde0bf01429257eb59f13030d4]\n    __igb_close+0x6f/0x9c [igb 6615058754948bfde0bf01429257eb59f13030d4]\n    igb_close+0x23/0x2b [igb 6615058754948bfde0bf01429257eb59f13030d4]\n    __dev_close_many+0x95/0xec\n    dev_close_many+0x6e/0x103\n    unregister_netdevice_many+0x105/0x5b1\n    unregister_netdevice_queue+0xc2/0x10d\n    unregister_netdev+0x1c/0x23\n    igb_remove+0xa7/0x11c [igb 6615058754948bfde0bf01429257eb59f13030d4]\n    pci_device_remove+0x3f/0x9c\n    device_release_driver_internal+0xfe/0x1b4\n    pci_stop_bus_device+0x5b/0x7f\n    pci_stop_bus_device+0x30/0x7f\n    pci_stop_bus_device+0x30/0x7f\n    pci_stop_and_remove_bus_device+0x12/0x19\n    pciehp_unconfigure_device+0x76/0xe9\n    pciehp_disable_slot+0x6e/0x131\n    pciehp_handle_presence_or_link_change+0x7a/0x3f7\n    pciehp_ist+0xbe/0x194\n    irq_thread_fn+0x22/0x4d\n    ? irq_thread+0x1fd/0x1fd\n    irq_thread+0x17b/0x1fd\n    ? irq_forced_thread_fn+0x5f/0x5f\n    kthread+0x142/0x153\n    ? __irq_get_irqchip_state+0x46/0x46\n    ? kthread_associate_blkcg+0x71/0x71\n    ret_from_fork+0x1f/0x30\n\nIn this case, igb_io_error_detected detaches the network interface\nand requests a PCIE slot reset, however, the PCIE reset callback is\nnot being invoked and thus the Ethernet connection breaks down.\nAs the PCIE error in this case is a non-fatal one, requesting a\nslot reset can be avoided.\nThis patch fixes the task hung issue and preserves Ethernet\nconnection by ignoring non-fatal PCIE errors.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53148"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/004d25060c78fc31f66da0fa439c544dda1ac9d5",
          "url": "https://git.kernel.org/stable/c/004d25060c78fc31f66da0fa439c544dda1ac9d5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/124e39a734cb90658b8f0dc110847bbfc6e33792",
          "url": "https://git.kernel.org/stable/c/124e39a734cb90658b8f0dc110847bbfc6e33792"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/39695e87d86f0e7d897fba1d2559f825aa20caeb",
          "url": "https://git.kernel.org/stable/c/39695e87d86f0e7d897fba1d2559f825aa20caeb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/41f63b72a01c0e0ac59ab83fd2d921fcce0f602d",
          "url": "https://git.kernel.org/stable/c/41f63b72a01c0e0ac59ab83fd2d921fcce0f602d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/994c2ceb70ea99264ccc6f09e6703ca267dad63c",
          "url": "https://git.kernel.org/stable/c/994c2ceb70ea99264ccc6f09e6703ca267dad63c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c2312e1d12b1c3ee4100c173131b102e2aed4d04",
          "url": "https://git.kernel.org/stable/c/c2312e1d12b1c3ee4100c173131b102e2aed4d04"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c9f56f3c7bc908caa772112d3ae71cdd5d18c257",
          "url": "https://git.kernel.org/stable/c/c9f56f3c7bc908caa772112d3ae71cdd5d18c257"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fa92c463eba75dcedbd8d689ffdcb83293aaa0c3",
          "url": "https://git.kernel.org/stable/c/fa92c463eba75dcedbd8d689ffdcb83293aaa0c3"
        }
      ],
      "release_date": "2025-09-15T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39869",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: ti: edma: Fix memory allocation size for queue_priority_map\n\nFix a critical memory allocation bug in edma_setup_from_hw() where\nqueue_priority_map was allocated with insufficient memory. The code\ndeclared queue_priority_map as s8 (*)[2] (pointer to array of 2 s8),\nbut allocated memory using sizeof(s8) instead of the correct size.\n\nThis caused out-of-bounds memory writes when accessing:\n  queue_priority_map[i][0] = i;\n  queue_priority_map[i][1] = i;\n\nThe bug manifested as kernel crashes with \"Oops - undefined instruction\"\non ARM platforms (BeagleBoard-X15) during EDMA driver probe, as the\nmemory corruption triggered kernel hardening features on Clang.\n\nChange the allocation to use sizeof(*queue_priority_map) which\nautomatically gets the correct size for the 2D array structure.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39869"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/069fd1688c57c0cc8a3de64d108579b31676f74b",
          "url": "https://git.kernel.org/stable/c/069fd1688c57c0cc8a3de64d108579b31676f74b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1baed10553fc8b388351d8fc803e3ae6f1a863bc",
          "url": "https://git.kernel.org/stable/c/1baed10553fc8b388351d8fc803e3ae6f1a863bc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/301a96cc4dc006c9a285913d301e681cfbf7edb6",
          "url": "https://git.kernel.org/stable/c/301a96cc4dc006c9a285913d301e681cfbf7edb6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5e462fa0dfdb52b3983cf41532d3d4c7d63e2f93",
          "url": "https://git.kernel.org/stable/c/5e462fa0dfdb52b3983cf41532d3d4c7d63e2f93"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7d4de60d6db02d9b01d5890d5156b04fad65d07a",
          "url": "https://git.kernel.org/stable/c/7d4de60d6db02d9b01d5890d5156b04fad65d07a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d5e82f3f2c918d446df46e8d65f8083fd97cdec5",
          "url": "https://git.kernel.org/stable/c/d5e82f3f2c918d446df46e8d65f8083fd97cdec5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d722de80ce037dccf6931e778f4a46499d51bdf9",
          "url": "https://git.kernel.org/stable/c/d722de80ce037dccf6931e778f4a46499d51bdf9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e63419dbf2ceb083c1651852209c7f048089ac0f",
          "url": "https://git.kernel.org/stable/c/e63419dbf2ceb083c1651852209c7f048089ac0f"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-23T06:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38555",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget : fix use-after-free in composite_dev_cleanup()\n\n1. In func configfs_composite_bind() -> composite_os_desc_req_prepare():\nif kmalloc fails, the pointer cdev->os_desc_req will be freed but not\nset to NULL. Then it will return a failure to the upper-level function.\n2. in func configfs_composite_bind() -> composite_dev_cleanup():\nit will checks whether cdev->os_desc_req is NULL. If it is not NULL, it\nwill attempt to use it.This will lead to a use-after-free issue.\n\nBUG: KASAN: use-after-free in composite_dev_cleanup+0xf4/0x2c0\nRead of size 8 at addr 0000004827837a00 by task init/1\n\nCPU: 10 PID: 1 Comm: init Tainted: G           O      5.10.97-oh #1\n kasan_report+0x188/0x1cc\n __asan_load8+0xb4/0xbc\n composite_dev_cleanup+0xf4/0x2c0\n configfs_composite_bind+0x210/0x7ac\n udc_bind_to_driver+0xb4/0x1ec\n usb_gadget_probe_driver+0xec/0x21c\n gadget_dev_desc_UDC_store+0x264/0x27c",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/151c0aa896c47a4459e07fee7d4843f44c1bb18e",
          "url": "https://git.kernel.org/stable/c/151c0aa896c47a4459e07fee7d4843f44c1bb18e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2db29235e900a084a656dea7e0939b0abb7bb897",
          "url": "https://git.kernel.org/stable/c/2db29235e900a084a656dea7e0939b0abb7bb897"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5f06ee9f9a3665d43133f125c17e5258a13f3963",
          "url": "https://git.kernel.org/stable/c/5f06ee9f9a3665d43133f125c17e5258a13f3963"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8afb22aa063f706f3343707cdfb8cda4d021dd33",
          "url": "https://git.kernel.org/stable/c/8afb22aa063f706f3343707cdfb8cda4d021dd33"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/aada327a9f8028c573636fa60c0abc80fb8135c9",
          "url": "https://git.kernel.org/stable/c/aada327a9f8028c573636fa60c0abc80fb8135c9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bd3c4ef60baf7f65c963f3e12d9d7b2b091e20ba",
          "url": "https://git.kernel.org/stable/c/bd3c4ef60baf7f65c963f3e12d9d7b2b091e20ba"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dba96dfa5a0f685b959dd28a52ac8dab0b805204",
          "url": "https://git.kernel.org/stable/c/dba96dfa5a0f685b959dd28a52ac8dab0b805204"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e1be1f380c82a69f80c68c96a7cfe8759fb30355",
          "url": "https://git.kernel.org/stable/c/e1be1f380c82a69f80c68c96a7cfe8759fb30355"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e624bf26127645a2f7821e73fdf6dc64bad07835",
          "url": "https://git.kernel.org/stable/c/e624bf26127645a2f7821e73fdf6dc64bad07835"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-08-19T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38497",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: configfs: Fix OOB read on empty string write\n\nWhen writing an empty string to either 'qw_sign' or 'landingPage'\nsysfs attributes, the store functions attempt to access page[l - 1]\nbefore validating that the length 'l' is greater than zero.\n\nThis patch fixes the vulnerability by adding a check at the beginning\nof os_desc_qw_sign_store() and webusb_landingPage_store() to handle\nthe zero-length input case gracefully by returning immediately.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38497"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/15a87206879951712915c03c8952a73d6a74721e",
          "url": "https://git.kernel.org/stable/c/15a87206879951712915c03c8952a73d6a74721e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/22b7897c289cc25d99c603f5144096142a30d897",
          "url": "https://git.kernel.org/stable/c/22b7897c289cc25d99c603f5144096142a30d897"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2798111f8e504ac747cce911226135d50b8de468",
          "url": "https://git.kernel.org/stable/c/2798111f8e504ac747cce911226135d50b8de468"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3014168731b7930300aab656085af784edc861f6",
          "url": "https://git.kernel.org/stable/c/3014168731b7930300aab656085af784edc861f6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/58bdd5160184645771553ea732da5c2887fc9bd1",
          "url": "https://git.kernel.org/stable/c/58bdd5160184645771553ea732da5c2887fc9bd1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/783ea37b237a9b524f1e5ca018ea17d772ee0ea0",
          "url": "https://git.kernel.org/stable/c/783ea37b237a9b524f1e5ca018ea17d772ee0ea0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/78b41148cfea2a3f04d87adf3a71b21735820a37",
          "url": "https://git.kernel.org/stable/c/78b41148cfea2a3f04d87adf3a71b21735820a37"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d68b7c8fefbaeae8f065b84e40cf64baf4cc0c76",
          "url": "https://git.kernel.org/stable/c/d68b7c8fefbaeae8f065b84e40cf64baf4cc0c76"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-28T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53000",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetlink: prevent potential spectre v1 gadgets\n\nMost netlink attributes are parsed and validated from\n__nla_validate_parse() or validate_nla()\n\n    u16 type = nla_type(nla);\n\n    if (type == 0 || type > maxtype) {\n        /* error or continue */\n    }\n\n@type is then used as an array index and can be used\nas a Spectre v1 gadget.\n\narray_index_nospec() can be used to prevent leaking\ncontent of kernel memory to malicious users.\n\nThis should take care of vast majority of netlink uses,\nbut an audit is needed to take care of others where\nvalidation is not yet centralized in core netlink functions.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53000"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3e5082b1c66c7783fbcd79b5b178573230e528ff",
          "url": "https://git.kernel.org/stable/c/3e5082b1c66c7783fbcd79b5b178573230e528ff"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/41b74e95f297ac360ca7ed6bf200100717cb6c45",
          "url": "https://git.kernel.org/stable/c/41b74e95f297ac360ca7ed6bf200100717cb6c45"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/539ca5dcbc91134bbe2c45677811c31d8b030d2d",
          "url": "https://git.kernel.org/stable/c/539ca5dcbc91134bbe2c45677811c31d8b030d2d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/992e4ff7116a77968039277b5d6aaa535c2f2184",
          "url": "https://git.kernel.org/stable/c/992e4ff7116a77968039277b5d6aaa535c2f2184"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f0950402e8c76e7dcb08563f1b4e8000fbc62455",
          "url": "https://git.kernel.org/stable/c/f0950402e8c76e7dcb08563f1b4e8000fbc62455"
        }
      ],
      "release_date": "2025-03-27T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53219",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: netup_unidvb: fix use-after-free at del_timer()\n\nWhen Universal DVB card is detaching, netup_unidvb_dma_fini()\nuses del_timer() to stop dma->timeout timer. But when timer\nhandler netup_unidvb_dma_timeout() is running, del_timer()\ncould not stop it. As a result, the use-after-free bug could\nhappen. The process is shown below:\n\n    (cleanup routine)          |        (timer routine)\n                               | mod_timer(&dev->tx_sim_timer, ..)\nnetup_unidvb_finidev()         | (wait a time)\n  netup_unidvb_dma_fini()      | netup_unidvb_dma_timeout()\n    del_timer(&dma->timeout);  |\n                               |   ndev->pci_dev->dev //USE\n\nFix by changing del_timer() to del_timer_sync().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53219"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/051af3f0b7d1cd8ab7f3e2523ad8ae1af44caba3",
          "url": "https://git.kernel.org/stable/c/051af3f0b7d1cd8ab7f3e2523ad8ae1af44caba3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/07821524f67bf920342bc84ae8b3dea2a315a89e",
          "url": "https://git.kernel.org/stable/c/07821524f67bf920342bc84ae8b3dea2a315a89e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0f5bb36bf9b39a2a96e730bf4455095b50713f63",
          "url": "https://git.kernel.org/stable/c/0f5bb36bf9b39a2a96e730bf4455095b50713f63"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1550bcf2983ae1220cc8ab899a39a423fa7cb523",
          "url": "https://git.kernel.org/stable/c/1550bcf2983ae1220cc8ab899a39a423fa7cb523"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/90229e9ee957d4514425e4a4d82c50ab5d57ac4d",
          "url": "https://git.kernel.org/stable/c/90229e9ee957d4514425e4a4d82c50ab5d57ac4d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c8f9c05e1ebcc9c7bc211cc8b74d8fb86a8756fc",
          "url": "https://git.kernel.org/stable/c/c8f9c05e1ebcc9c7bc211cc8b74d8fb86a8756fc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dd5c77814f290b353917df329f36de1472d47154",
          "url": "https://git.kernel.org/stable/c/dd5c77814f290b353917df329f36de1472d47154"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f9982db735a8495eee14267cf193c806b957e942",
          "url": "https://git.kernel.org/stable/c/f9982db735a8495eee14267cf193c806b957e942"
        }
      ],
      "release_date": "2025-09-15T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37927",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid\n\nThere is a string parsing logic error which can lead to an overflow of hid\nor uid buffers. Comparing ACPIID_LEN against a total string length doesn't\ntake into account the lengths of individual hid and uid buffers so the\ncheck is insufficient in some cases. For example if the length of hid\nstring is 4 and the length of the uid string is 260, the length of str\nwill be equal to ACPIID_LEN + 1 but uid string will overflow uid buffer\nwhich size is 256.\n\nThe same applies to the hid string with length 13 and uid string with\nlength 250.\n\nCheck the length of hid and uid strings separately to prevent\nbuffer overflow.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37927"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/10d901a95f8e766e5aa0bb9a983fb41271f64718",
          "url": "https://git.kernel.org/stable/c/10d901a95f8e766e5aa0bb9a983fb41271f64718"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/13d67528e1ae4486e9ab24b70122fab104c73c29",
          "url": "https://git.kernel.org/stable/c/13d67528e1ae4486e9ab24b70122fab104c73c29"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2b65060c84ee4d8dc64fae6d2728b528e9e832e1",
          "url": "https://git.kernel.org/stable/c/2b65060c84ee4d8dc64fae6d2728b528e9e832e1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/466d9da267079a8d3b69fa72dfa3a732e1f6dbb5",
          "url": "https://git.kernel.org/stable/c/466d9da267079a8d3b69fa72dfa3a732e1f6dbb5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8dee308e4c01dea48fc104d37f92d5b58c50b96c",
          "url": "https://git.kernel.org/stable/c/8dee308e4c01dea48fc104d37f92d5b58c50b96c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a65ebfed65fa62797ec1f5f1dcf7adb157a2de1e",
          "url": "https://git.kernel.org/stable/c/a65ebfed65fa62797ec1f5f1dcf7adb157a2de1e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c3f37faa71f5d26dd2144b3f2b14525ec8f5e41f",
          "url": "https://git.kernel.org/stable/c/c3f37faa71f5d26dd2144b3f2b14525ec8f5e41f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c8bdfc0297965bb13fa439d36ca9c4f7c8447f0f",
          "url": "https://git.kernel.org/stable/c/c8bdfc0297965bb13fa439d36ca9c4f7c8447f0f"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        }
      ],
      "release_date": "2025-05-20T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53577",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, cpumap: Make sure kthread is running before map update returns\n\nThe following warning was reported when running stress-mode enabled\nxdp_redirect_cpu with some RT threads:\n\n  ------------[ cut here ]------------\n  WARNING: CPU: 4 PID: 65 at kernel/bpf/cpumap.c:135\n  CPU: 4 PID: 65 Comm: kworker/4:1 Not tainted 6.5.0-rc2+ #1\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)\n  Workqueue: events cpu_map_kthread_stop\n  RIP: 0010:put_cpu_map_entry+0xda/0x220\n  ......\n  Call Trace:\n   <TASK>\n   ? show_regs+0x65/0x70\n   ? __warn+0xa5/0x240\n   ......\n   ? put_cpu_map_entry+0xda/0x220\n   cpu_map_kthread_stop+0x41/0x60\n   process_one_work+0x6b0/0xb80\n   worker_thread+0x96/0x720\n   kthread+0x1a5/0x1f0\n   ret_from_fork+0x3a/0x70\n   ret_from_fork_asm+0x1b/0x30\n   </TASK>\n\nThe root cause is the same as commit 436901649731 (\"bpf: cpumap: Fix memory\nleak in cpu_map_update_elem\"). The kthread is stopped prematurely by\nkthread_stop() in cpu_map_kthread_stop(), and kthread() doesn't call\ncpu_map_kthread_run() at all but XDP program has already queued some\nframes or skbs into ptr_ring. So when __cpu_map_ring_cleanup() checks\nthe ptr_ring, it will find it was not emptied and report a warning.\n\nAn alternative fix is to use __cpu_map_ring_cleanup() to drop these\npending frames or skbs when kthread_stop() returns -EINTR, but it may\nconfuse the user, because these frames or skbs have been handled\ncorrectly by XDP program. So instead of dropping these frames or skbs,\njust make sure the per-cpu kthread is running before\n__cpu_map_entry_alloc() returns.\n\nAfter apply the fix, the error handle for kthread_stop() will be\nunnecessary because it will always return 0, so just remove it.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53577"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/640a604585aa30f93e39b17d4d6ba69fcb1e66c9",
          "url": "https://git.kernel.org/stable/c/640a604585aa30f93e39b17d4d6ba69fcb1e66c9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7a1178a3671b40746830d355836b72e47ceb2490",
          "url": "https://git.kernel.org/stable/c/7a1178a3671b40746830d355836b72e47ceb2490"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b44d28b98f185d2f2348aa3c3636838c316f889e",
          "url": "https://git.kernel.org/stable/c/b44d28b98f185d2f2348aa3c3636838c316f889e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ecb45b852af5e88257020b88bea5ff0798d72aca",
          "url": "https://git.kernel.org/stable/c/ecb45b852af5e88257020b88bea5ff0798d72aca"
        }
      ],
      "release_date": "2025-10-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38069",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: endpoint: pci-epf-test: Fix double free that causes kernel to oops\n\nFix a kernel oops found while testing the stm32_pcie Endpoint driver\nwith handling of PERST# deassertion:\n\nDuring EP initialization, pci_epf_test_alloc_space() allocates all BARs,\nwhich are further freed if epc_set_bar() fails (for instance, due to no\nfree inbound window).\n\nHowever, when pci_epc_set_bar() fails, the error path:\n\n  pci_epc_set_bar() ->\n    pci_epf_free_space()\n\ndoes not clear the previous assignment to epf_test->reg[bar].\n\nThen, if the host reboots, the PERST# deassertion restarts the BAR\nallocation sequence with the same allocation failure (no free inbound\nwindow), creating a double free situation since epf_test->reg[bar] was\ndeallocated and is still non-NULL.\n\nThus, make sure that pci_epf_alloc_space() and pci_epf_free_space()\ninvocations are symmetric, and as such, set epf_test->reg[bar] to NULL\nwhen memory is freed.\n\n[kwilczynski: commit log]",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38069"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8b83893d1f6c6061a7d58169ecdf9d5ee9f306ee",
          "url": "https://git.kernel.org/stable/c/8b83893d1f6c6061a7d58169ecdf9d5ee9f306ee"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/934e9d137d937706004c325fa1474f9e3f1ba10a",
          "url": "https://git.kernel.org/stable/c/934e9d137d937706004c325fa1474f9e3f1ba10a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fe2329eff5bee461ebcafadb6ca1df0cbf5945fd",
          "url": "https://git.kernel.org/stable/c/fe2329eff5bee461ebcafadb6ca1df0cbf5945fd"
        }
      ],
      "release_date": "2025-06-18T10:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38079",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: algif_hash - fix double free in hash_accept\n\nIf accept(2) is called on socket type algif_hash with\nMSG_MORE flag set and crypto_ahash_import fails,\nsk2 is freed. However, it is also freed in af_alg_release,\nleading to slab-use-after-free error.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38079"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0346f4b742345d1c733c977f3a7aef5a6419a967",
          "url": "https://git.kernel.org/stable/c/0346f4b742345d1c733c977f3a7aef5a6419a967"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/134daaba93193df9e988524b5cd2f52d15eb1993",
          "url": "https://git.kernel.org/stable/c/134daaba93193df9e988524b5cd2f52d15eb1993"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2f45a8d64fb4ed4830a4b3273834ecd6ca504896",
          "url": "https://git.kernel.org/stable/c/2f45a8d64fb4ed4830a4b3273834ecd6ca504896"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5bff312b59b3f2a54ff504e4f4e47272b64f3633",
          "url": "https://git.kernel.org/stable/c/5bff312b59b3f2a54ff504e4f4e47272b64f3633"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b2df03ed4052e97126267e8c13ad4204ea6ba9b6",
          "url": "https://git.kernel.org/stable/c/b2df03ed4052e97126267e8c13ad4204ea6ba9b6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bf7bba75b91539e93615f560893a599c1e1c98bf",
          "url": "https://git.kernel.org/stable/c/bf7bba75b91539e93615f560893a599c1e1c98bf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c3059d58f79fdfb2201249c2741514e34562b547",
          "url": "https://git.kernel.org/stable/c/c3059d58f79fdfb2201249c2741514e34562b547"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f0f3d09f53534ea385d55ced408f2b67059b16e4",
          "url": "https://git.kernel.org/stable/c/f0f3d09f53534ea385d55ced408f2b67059b16e4"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-06-18T10:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39743",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: truncate good inode pages when hard link is 0\n\nThe fileset value of the inode copy from the disk by the reproducer is\nAGGR_RESERVED_I. When executing evict, its hard link number is 0, so its\ninode pages are not truncated. This causes the bugon to be triggered when\nexecuting clear_inode() because nrpages is greater than 0.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39743"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1bb5cdc3e39f0c2b311fcb631258b7e60d3fb0d3",
          "url": "https://git.kernel.org/stable/c/1bb5cdc3e39f0c2b311fcb631258b7e60d3fb0d3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2b1d5ca395a5fb170c3f885cd42c16179f7f54ec",
          "url": "https://git.kernel.org/stable/c/2b1d5ca395a5fb170c3f885cd42c16179f7f54ec"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2d91b3765cd05016335cd5df5e5c6a29708ec058",
          "url": "https://git.kernel.org/stable/c/2d91b3765cd05016335cd5df5e5c6a29708ec058"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/34d8e982bac48bdcca7524644a8825a580edce74",
          "url": "https://git.kernel.org/stable/c/34d8e982bac48bdcca7524644a8825a580edce74"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5845b926c561b8333cd65169526eec357d7bb449",
          "url": "https://git.kernel.org/stable/c/5845b926c561b8333cd65169526eec357d7bb449"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/89fff8e3d6710fc32507b8e19eb5afa9fb79b896",
          "url": "https://git.kernel.org/stable/c/89fff8e3d6710fc32507b8e19eb5afa9fb79b896"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8ed7275910fb7177012619864e04d3008763f3ea",
          "url": "https://git.kernel.org/stable/c/8ed7275910fb7177012619864e04d3008763f3ea"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b5b471820c33365a8ccd2d463578bf4e47056c2c",
          "url": "https://git.kernel.org/stable/c/b5b471820c33365a8ccd2d463578bf4e47056c2c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/df3fd8daf278eca365f221749ae5b728e8382a04",
          "url": "https://git.kernel.org/stable/c/df3fd8daf278eca365f221749ae5b728e8382a04"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-11T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53515",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-mmio: don't break lifecycle of vm_dev\n\nvm_dev has a separate lifecycle because it has a 'struct device'\nembedded. Thus, having a release callback for it is correct.\n\nAllocating the vm_dev struct with devres totally breaks this protection,\nthough. Instead of waiting for the vm_dev release callback, the memory\nis freed when the platform_device is removed. Resulting in a\nuse-after-free when finally the callback is to be called.\n\nTo easily see the problem, compile the kernel with\nCONFIG_DEBUG_KOBJECT_RELEASE and unbind with sysfs.\n\nThe fix is easy, don't use devres in this case.\n\nFound during my research about object lifetime problems.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53515"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2dcb368fe5a8eee498ca75c93a18ce2f3b0d6a8e",
          "url": "https://git.kernel.org/stable/c/2dcb368fe5a8eee498ca75c93a18ce2f3b0d6a8e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3ff54d904fafabd0912796785e53cce4e69ca123",
          "url": "https://git.kernel.org/stable/c/3ff54d904fafabd0912796785e53cce4e69ca123"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/55c91fedd03d7b9cf0c5199b2eb12b9b8e95281a",
          "url": "https://git.kernel.org/stable/c/55c91fedd03d7b9cf0c5199b2eb12b9b8e95281a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5b7d5c2dd664eb8b9a06ecbc06e28d39359c422e",
          "url": "https://git.kernel.org/stable/c/5b7d5c2dd664eb8b9a06ecbc06e28d39359c422e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/97a2d55ead76358245b446efd87818e919196d7a",
          "url": "https://git.kernel.org/stable/c/97a2d55ead76358245b446efd87818e919196d7a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/af5818c35173e096085c6ae2e3aac605d3d15e41",
          "url": "https://git.kernel.org/stable/c/af5818c35173e096085c6ae2e3aac605d3d15e41"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b788ad3b2468512339c05f23692e36860264e674",
          "url": "https://git.kernel.org/stable/c/b788ad3b2468512339c05f23692e36860264e674"
        }
      ],
      "release_date": "2025-10-01T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53619",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: conntrack: Avoid nf_ct_helper_hash uses after free\n\nIf nf_conntrack_init_start() fails (for example due to a\nregister_nf_conntrack_bpf() failure), the nf_conntrack_helper_fini()\nclean-up path frees the nf_ct_helper_hash map.\n\nWhen built with NF_CONNTRACK=y, further netfilter modules (e.g:\nnetfilter_conntrack_ftp) can still be loaded and call\nnf_conntrack_helpers_register(), independently of whether nf_conntrack\ninitialized correctly. This accesses the nf_ct_helper_hash dangling\npointer and causes a uaf, possibly leading to random memory corruption.\n\nThis patch guards nf_conntrack_helper_register() from accessing a freed\nor uninitialized nf_ct_helper_hash pointer and fixes possible\nuses-after-free when loading a conntrack module.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53619"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/00716f25f9697d02a0d9bd622575c7c7321ba3d0",
          "url": "https://git.kernel.org/stable/c/00716f25f9697d02a0d9bd622575c7c7321ba3d0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/05561f822f27b9fa88fa5504ddec34bf38833034",
          "url": "https://git.kernel.org/stable/c/05561f822f27b9fa88fa5504ddec34bf38833034"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4ee69c91cb8f9ca144bc0861969e5a1a3c6152a7",
          "url": "https://git.kernel.org/stable/c/4ee69c91cb8f9ca144bc0861969e5a1a3c6152a7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/61c7a5256543ae7d24cd9d21853d514c8632e1e9",
          "url": "https://git.kernel.org/stable/c/61c7a5256543ae7d24cd9d21853d514c8632e1e9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6eef7a2b933885a17679eb8ed0796ddf0ee5309b",
          "url": "https://git.kernel.org/stable/c/6eef7a2b933885a17679eb8ed0796ddf0ee5309b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6f03ce2f1abcb9f9d0511e3659ca6eb60e39f566",
          "url": "https://git.kernel.org/stable/c/6f03ce2f1abcb9f9d0511e3659ca6eb60e39f566"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8289d422f5e484efe4a565fe18e862ecd621c175",
          "url": "https://git.kernel.org/stable/c/8289d422f5e484efe4a565fe18e862ecd621c175"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fce5cc7cbd4b92f979bf02c9ec5fb69aaeba92d7",
          "url": "https://git.kernel.org/stable/c/fce5cc7cbd4b92f979bf02c9ec5fb69aaeba92d7"
        }
      ],
      "release_date": "2025-10-07T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39702",
      "cwe": {
        "id": "CWE-203",
        "name": "Observable Discrepancy"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: sr: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39702"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3b348c9c8d2ca2c67559ffd0e258ae7e1107d4f0",
          "url": "https://git.kernel.org/stable/c/3b348c9c8d2ca2c67559ffd0e258ae7e1107d4f0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3ddd55cf19ed6cc62def5e3af10c2a9df1b861c3",
          "url": "https://git.kernel.org/stable/c/3ddd55cf19ed6cc62def5e3af10c2a9df1b861c3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/86b6d34717fe0570afce07ee79b8eeb40341f831",
          "url": "https://git.kernel.org/stable/c/86b6d34717fe0570afce07ee79b8eeb40341f831"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a458b2902115b26a25d67393b12ddd57d1216aaa",
          "url": "https://git.kernel.org/stable/c/a458b2902115b26a25d67393b12ddd57d1216aaa"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b3967c493799e63f648e9c7b6cb063aa2aed04e7",
          "url": "https://git.kernel.org/stable/c/b3967c493799e63f648e9c7b6cb063aa2aed04e7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f7878d47560d61e3f370aca3cebb8f42a55b990a",
          "url": "https://git.kernel.org/stable/c/f7878d47560d61e3f370aca3cebb8f42a55b990a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ff55a452d56490047f5233cc48c5d933f8586884",
          "url": "https://git.kernel.org/stable/c/ff55a452d56490047f5233cc48c5d933f8586884"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-05T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38527",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix use-after-free in cifs_oplock_break\n\nA race condition can occur in cifs_oplock_break() leading to a\nuse-after-free of the cinode structure when unmounting:\n\n  cifs_oplock_break()\n    _cifsFileInfo_put(cfile)\n      cifsFileInfo_put_final()\n        cifs_sb_deactive()\n          [last ref, start releasing sb]\n            kill_sb()\n              kill_anon_super()\n                generic_shutdown_super()\n                  evict_inodes()\n                    dispose_list()\n                      evict()\n                        destroy_inode()\n                          call_rcu(&inode->i_rcu, i_callback)\n    spin_lock(&cinode->open_file_lock)  <- OK\n                            [later] i_callback()\n                              cifs_free_inode()\n                                kmem_cache_free(cinode)\n    spin_unlock(&cinode->open_file_lock)  <- UAF\n    cifs_done_oplock_break(cinode)       <- UAF\n\nThe issue occurs when umount has already released its reference to the\nsuperblock. When _cifsFileInfo_put() calls cifs_sb_deactive(), this\nreleases the last reference, triggering the immediate cleanup of all\ninodes under RCU. However, cifs_oplock_break() continues to access the\ncinode after this point, resulting in use-after-free.\n\nFix this by holding an extra reference to the superblock during the\nentire oplock break operation. This ensures that the superblock and\nits inodes remain valid until the oplock break completes.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38527"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/09bce2138a30ef10d8821c8c3f73a4ab7a5726bc",
          "url": "https://git.kernel.org/stable/c/09bce2138a30ef10d8821c8c3f73a4ab7a5726bc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0a4eec84d4d2c4085d4ed8630fd74e4b39033c1b",
          "url": "https://git.kernel.org/stable/c/0a4eec84d4d2c4085d4ed8630fd74e4b39033c1b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2baaf5bbab2ac474c4f92c10fcb3310f824db995",
          "url": "https://git.kernel.org/stable/c/2baaf5bbab2ac474c4f92c10fcb3310f824db995"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4256a483fe58af66a46cbf3dc48ff26e580d3308",
          "url": "https://git.kernel.org/stable/c/4256a483fe58af66a46cbf3dc48ff26e580d3308"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/705c79101ccf9edea5a00d761491a03ced314210",
          "url": "https://git.kernel.org/stable/c/705c79101ccf9edea5a00d761491a03ced314210"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/da11bd4b697b393a207f19a2ed7d382a811a3ddc",
          "url": "https://git.kernel.org/stable/c/da11bd4b697b393a207f19a2ed7d382a811a3ddc"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-08-16T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38713",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()\n\nThe hfsplus_readdir() method is capable to crash by calling\nhfsplus_uni2asc():\n\n[  667.121659][ T9805] ==================================================================\n[  667.122651][ T9805] BUG: KASAN: slab-out-of-bounds in hfsplus_uni2asc+0x902/0xa10\n[  667.123627][ T9805] Read of size 2 at addr ffff88802592f40c by task repro/9805\n[  667.124578][ T9805]\n[  667.124876][ T9805] CPU: 3 UID: 0 PID: 9805 Comm: repro Not tainted 6.16.0-rc3 #1 PREEMPT(full)\n[  667.124886][ T9805] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n[  667.124890][ T9805] Call Trace:\n[  667.124893][ T9805]  <TASK>\n[  667.124896][ T9805]  dump_stack_lvl+0x10e/0x1f0\n[  667.124911][ T9805]  print_report+0xd0/0x660\n[  667.124920][ T9805]  ? __virt_addr_valid+0x81/0x610\n[  667.124928][ T9805]  ? __phys_addr+0xe8/0x180\n[  667.124934][ T9805]  ? hfsplus_uni2asc+0x902/0xa10\n[  667.124942][ T9805]  kasan_report+0xc6/0x100\n[  667.124950][ T9805]  ? hfsplus_uni2asc+0x902/0xa10\n[  667.124959][ T9805]  hfsplus_uni2asc+0x902/0xa10\n[  667.124966][ T9805]  ? hfsplus_bnode_read+0x14b/0x360\n[  667.124974][ T9805]  hfsplus_readdir+0x845/0xfc0\n[  667.124984][ T9805]  ? __pfx_hfsplus_readdir+0x10/0x10\n[  667.124994][ T9805]  ? stack_trace_save+0x8e/0xc0\n[  667.125008][ T9805]  ? iterate_dir+0x18b/0xb20\n[  667.125015][ T9805]  ? trace_lock_acquire+0x85/0xd0\n[  667.125022][ T9805]  ? lock_acquire+0x30/0x80\n[  667.125029][ T9805]  ? iterate_dir+0x18b/0xb20\n[  667.125037][ T9805]  ? down_read_killable+0x1ed/0x4c0\n[  667.125044][ T9805]  ? putname+0x154/0x1a0\n[  667.125051][ T9805]  ? __pfx_down_read_killable+0x10/0x10\n[  667.125058][ T9805]  ? apparmor_file_permission+0x239/0x3e0\n[  667.125069][ T9805]  iterate_dir+0x296/0xb20\n[  667.125076][ T9805]  __x64_sys_getdents64+0x13c/0x2c0\n[  667.125084][ T9805]  ? __pfx___x64_sys_getdents64+0x10/0x10\n[  667.125091][ T9805]  ? __x64_sys_openat+0x141/0x200\n[  667.125126][ T9805]  ? __pfx_filldir64+0x10/0x10\n[  667.125134][ T9805]  ? do_user_addr_fault+0x7fe/0x12f0\n[  667.125143][ T9805]  do_syscall_64+0xc9/0x480\n[  667.125151][ T9805]  entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[  667.125158][ T9805] RIP: 0033:0x7fa8753b2fc9\n[  667.125164][ T9805] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 48\n[  667.125172][ T9805] RSP: 002b:00007ffe96f8e0f8 EFLAGS: 00000217 ORIG_RAX: 00000000000000d9\n[  667.125181][ T9805] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa8753b2fc9\n[  667.125185][ T9805] RDX: 0000000000000400 RSI: 00002000000063c0 RDI: 0000000000000004\n[  667.125190][ T9805] RBP: 00007ffe96f8e110 R08: 00007ffe96f8e110 R09: 00007ffe96f8e110\n[  667.125195][ T9805] R10: 0000000000000000 R11: 0000000000000217 R12: 0000556b1e3b4260\n[  667.125199][ T9805] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[  667.125207][ T9805]  </TASK>\n[  667.125210][ T9805]\n[  667.145632][ T9805] Allocated by task 9805:\n[  667.145991][ T9805]  kasan_save_stack+0x20/0x40\n[  667.146352][ T9805]  kasan_save_track+0x14/0x30\n[  667.146717][ T9805]  __kasan_kmalloc+0xaa/0xb0\n[  667.147065][ T9805]  __kmalloc_noprof+0x205/0x550\n[  667.147448][ T9805]  hfsplus_find_init+0x95/0x1f0\n[  667.147813][ T9805]  hfsplus_readdir+0x220/0xfc0\n[  667.148174][ T9805]  iterate_dir+0x296/0xb20\n[  667.148549][ T9805]  __x64_sys_getdents64+0x13c/0x2c0\n[  667.148937][ T9805]  do_syscall_64+0xc9/0x480\n[  667.149291][ T9805]  entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[  667.149809][ T9805]\n[  667.150030][ T9805] The buggy address belongs to the object at ffff88802592f000\n[  667.150030][ T9805]  which belongs to the cache kmalloc-2k of size 2048\n[  667.151282][ T9805] The buggy address is located 0 bytes to the right of\n[  667.151282][ T9805]  allocated 1036-byte region [ffff88802592f000, ffff88802592f40c)\n[  667.1\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38713"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/13604b1d7e7b125fb428cddbec6b8d92baad25d5",
          "url": "https://git.kernel.org/stable/c/13604b1d7e7b125fb428cddbec6b8d92baad25d5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1ca69007e52a73bd8b84b988b61b319816ca8b01",
          "url": "https://git.kernel.org/stable/c/1ca69007e52a73bd8b84b988b61b319816ca8b01"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/291bb5d931c6f3cd7227b913302a17be21cf53b0",
          "url": "https://git.kernel.org/stable/c/291bb5d931c6f3cd7227b913302a17be21cf53b0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6f93694bcbc2c2ab3e01cd8fba2f296faf34e6b9",
          "url": "https://git.kernel.org/stable/c/6f93694bcbc2c2ab3e01cd8fba2f296faf34e6b9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/73f7da507d787b489761a0fa280716f84fa32b2f",
          "url": "https://git.kernel.org/stable/c/73f7da507d787b489761a0fa280716f84fa32b2f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/76a4c6636a69d69409aa253b049b1be717a539c5",
          "url": "https://git.kernel.org/stable/c/76a4c6636a69d69409aa253b049b1be717a539c5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/94458781aee6045bd3d0ad4b80b02886b9e2219b",
          "url": "https://git.kernel.org/stable/c/94458781aee6045bd3d0ad4b80b02886b9e2219b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ccf0ad56a779e6704c0b27f555dec847f50c7557",
          "url": "https://git.kernel.org/stable/c/ccf0ad56a779e6704c0b27f555dec847f50c7557"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f7534cbfac0a9ffa4fa17cacc6e8b6446dae24ee",
          "url": "https://git.kernel.org/stable/c/f7534cbfac0a9ffa4fa17cacc6e8b6446dae24ee"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37839",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\njbd2: remove wrong sb->s_sequence check\n\nJournal emptiness is not determined by sb->s_sequence == 0 but rather by\nsb->s_start == 0 (which is set a few lines above). Furthermore 0 is a\nvalid transaction ID so the check can spuriously trigger. Remove the\ninvalid WARN_ON.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37839"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3b4643ffaf72d7a5a357e9bf68b1775f8cfe7e77",
          "url": "https://git.kernel.org/stable/c/3b4643ffaf72d7a5a357e9bf68b1775f8cfe7e77"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9eaec071f111cd2124ce9a5b93536d3f6837d457",
          "url": "https://git.kernel.org/stable/c/9eaec071f111cd2124ce9a5b93536d3f6837d457"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ad926f735b4d4f10768fec7d080cadeb6d075cac",
          "url": "https://git.kernel.org/stable/c/ad926f735b4d4f10768fec7d080cadeb6d075cac"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b0cca357f85beb6144ab60c62dcc98508cc044bf",
          "url": "https://git.kernel.org/stable/c/b0cca357f85beb6144ab60c62dcc98508cc044bf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b479839525fe7906966cdc4b5b2afbca048558a1",
          "url": "https://git.kernel.org/stable/c/b479839525fe7906966cdc4b5b2afbca048558a1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c88f7328bb0fff66520fc9164f02b1d06e083c1b",
          "url": "https://git.kernel.org/stable/c/c88f7328bb0fff66520fc9164f02b1d06e083c1b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c98eb9ffb1d9c98237b5e1668eee17654e129fb0",
          "url": "https://git.kernel.org/stable/c/c98eb9ffb1d9c98237b5e1668eee17654e129fb0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cf30432f5b3064ff85d85639c2f0106f89c566f6",
          "url": "https://git.kernel.org/stable/c/cf30432f5b3064ff85d85639c2f0106f89c566f6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e6eff39dd0fe4190c6146069cc16d160e71d1148",
          "url": "https://git.kernel.org/stable/c/e6eff39dd0fe4190c6146069cc16d160e71d1148"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-09T07:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39967",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbcon: fix integer overflow in fbcon_do_set_font\n\nFix integer overflow vulnerabilities in fbcon_do_set_font() where font\nsize calculations could overflow when handling user-controlled font\nparameters.\n\nThe vulnerabilities occur when:\n1. CALC_FONTSZ(h, pitch, charcount) performs h * pith * charcount\n   multiplication with user-controlled values that can overflow.\n2. FONT_EXTRA_WORDS * sizeof(int) + size addition can also overflow\n3. This results in smaller allocations than expected, leading to buffer\n   overflows during font data copying.\n\nAdd explicit overflow checking using check_mul_overflow() and\ncheck_add_overflow() kernel helpers to safety validate all size\ncalculations before allocation.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39967"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1a194e6c8e1ee745e914b0b7f50fa86c89ed13fe",
          "url": "https://git.kernel.org/stable/c/1a194e6c8e1ee745e914b0b7f50fa86c89ed13fe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4a4bac869560f943edbe3c2b032062f6673b13d3",
          "url": "https://git.kernel.org/stable/c/4a4bac869560f943edbe3c2b032062f6673b13d3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/994bdc2d23c79087fbf7dcd9544454e8ebcef877",
          "url": "https://git.kernel.org/stable/c/994bdc2d23c79087fbf7dcd9544454e8ebcef877"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9c8ec14075c5317edd6b242f1be8167aa1e4e333",
          "url": "https://git.kernel.org/stable/c/9c8ec14075c5317edd6b242f1be8167aa1e4e333"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a6eb9f423b3db000aaedf83367b8539f6b72dcfc",
          "url": "https://git.kernel.org/stable/c/a6eb9f423b3db000aaedf83367b8539f6b72dcfc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/adac90bb1aaf45ca66f9db8ac100be16750ace78",
          "url": "https://git.kernel.org/stable/c/adac90bb1aaf45ca66f9db8ac100be16750ace78"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b8a6e85328aeb9881531dbe89bcd2637a06c3c95",
          "url": "https://git.kernel.org/stable/c/b8a6e85328aeb9881531dbe89bcd2637a06c3c95"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c0c01f9aa08c8e10e10e8c9ebb5be01a4eff6eb7",
          "url": "https://git.kernel.org/stable/c/c0c01f9aa08c8e10e10e8c9ebb5be01a4eff6eb7"
        }
      ],
      "release_date": "2025-10-15T08:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38051",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: Fix use-after-free in cifs_fill_dirent\n\nThere is a race condition in the readdir concurrency process, which may\naccess the rsp buffer after it has been released, triggering the\nfollowing KASAN warning.\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in cifs_fill_dirent+0xb03/0xb60 [cifs]\n Read of size 4 at addr ffff8880099b819c by task a.out/342975\n\n CPU: 2 UID: 0 PID: 342975 Comm: a.out Not tainted 6.15.0-rc6+ #240 PREEMPT(full)\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014\n Call Trace:\n  <TASK>\n  dump_stack_lvl+0x53/0x70\n  print_report+0xce/0x640\n  kasan_report+0xb8/0xf0\n  cifs_fill_dirent+0xb03/0xb60 [cifs]\n  cifs_readdir+0x12cb/0x3190 [cifs]\n  iterate_dir+0x1a1/0x520\n  __x64_sys_getdents+0x134/0x220\n  do_syscall_64+0x4b/0x110\n  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n RIP: 0033:0x7f996f64b9f9\n Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89\n f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01\n f0 ff ff  0d f7 c3 0c 00 f7 d8 64 89 8\n RSP: 002b:00007f996f53de78 EFLAGS: 00000207 ORIG_RAX: 000000000000004e\n RAX: ffffffffffffffda RBX: 00007f996f53ecdc RCX: 00007f996f64b9f9\n RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003\n RBP: 00007f996f53dea0 R08: 0000000000000000 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000207 R12: ffffffffffffff88\n R13: 0000000000000000 R14: 00007ffc8cd9a500 R15: 00007f996f51e000\n  </TASK>\n\n Allocated by task 408:\n  kasan_save_stack+0x20/0x40\n  kasan_save_track+0x14/0x30\n  __kasan_slab_alloc+0x6e/0x70\n  kmem_cache_alloc_noprof+0x117/0x3d0\n  mempool_alloc_noprof+0xf2/0x2c0\n  cifs_buf_get+0x36/0x80 [cifs]\n  allocate_buffers+0x1d2/0x330 [cifs]\n  cifs_demultiplex_thread+0x22b/0x2690 [cifs]\n  kthread+0x394/0x720\n  ret_from_fork+0x34/0x70\n  ret_from_fork_asm+0x1a/0x30\n\n Freed by task 342979:\n  kasan_save_stack+0x20/0x40\n  kasan_save_track+0x14/0x30\n  kasan_save_free_info+0x3b/0x60\n  __kasan_slab_free+0x37/0x50\n  kmem_cache_free+0x2b8/0x500\n  cifs_buf_release+0x3c/0x70 [cifs]\n  cifs_readdir+0x1c97/0x3190 [cifs]\n  iterate_dir+0x1a1/0x520\n  __x64_sys_getdents64+0x134/0x220\n  do_syscall_64+0x4b/0x110\n  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n The buggy address belongs to the object at ffff8880099b8000\n  which belongs to the cache cifs_request of size 16588\n The buggy address is located 412 bytes inside of\n  freed 16588-byte region [ffff8880099b8000, ffff8880099bc0cc)\n\n The buggy address belongs to the physical page:\n page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x99b8\n head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n anon flags: 0x80000000000040(head|node=0|zone=1)\n page_type: f5(slab)\n raw: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001\n raw: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000\n head: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001\n head: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000\n head: 0080000000000003 ffffea0000266e01 00000000ffffffff 00000000ffffffff\n head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008\n page dumped because: kasan: bad access detected\n\n Memory state around the buggy address:\n  ffff8880099b8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n  ffff8880099b8100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n >ffff8880099b8180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n                             ^\n  ffff8880099b8200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n  ffff8880099b8280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n ==================================================================\n\nPOC is available in the link [1].\n\nThe problem triggering process is as follows:\n\nProcess 1                       Process 2\n-----------------------------------\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38051"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1b197931fbc821bc7e9e91bf619400db563e3338",
          "url": "https://git.kernel.org/stable/c/1b197931fbc821bc7e9e91bf619400db563e3338"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/73cadde98f67f76c5eba00ac0b72c453383cec8b",
          "url": "https://git.kernel.org/stable/c/73cadde98f67f76c5eba00ac0b72c453383cec8b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9bea368648ac46f8593a780760362e40291d22a9",
          "url": "https://git.kernel.org/stable/c/9bea368648ac46f8593a780760362e40291d22a9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9c9aafbacc183598f064902365e107b5e856531f",
          "url": "https://git.kernel.org/stable/c/9c9aafbacc183598f064902365e107b5e856531f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a24c2f05ac3c5b0aaa539d9d913826d2643dfd0e",
          "url": "https://git.kernel.org/stable/c/a24c2f05ac3c5b0aaa539d9d913826d2643dfd0e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a7a8fe56e932a36f43e031b398aef92341bf5ea0",
          "url": "https://git.kernel.org/stable/c/a7a8fe56e932a36f43e031b398aef92341bf5ea0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/aee067e88d61eb72e966f094e4749c6b14e7008f",
          "url": "https://git.kernel.org/stable/c/aee067e88d61eb72e966f094e4749c6b14e7008f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c8623231e0edfcccb7cc6add0288fa0f0594282f",
          "url": "https://git.kernel.org/stable/c/c8623231e0edfcccb7cc6add0288fa0f0594282f"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-06-18T10:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37823",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too\n\nSimilarly to the previous patch, we need to safe guard hfsc_dequeue()\ntoo. But for this one, we don't have a reliable reproducer.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37823"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/11bccb054c1462fb069219f8e98e97a5a730758e",
          "url": "https://git.kernel.org/stable/c/11bccb054c1462fb069219f8e98e97a5a730758e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2f46d14919c39528c6e540ebc43f90055993eedc",
          "url": "https://git.kernel.org/stable/c/2f46d14919c39528c6e540ebc43f90055993eedc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/68f256305ceb426d545a0dc31f83c2ab1d211a1e",
          "url": "https://git.kernel.org/stable/c/68f256305ceb426d545a0dc31f83c2ab1d211a1e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6ccbda44e2cc3d26fd22af54c650d6d5d801addf",
          "url": "https://git.kernel.org/stable/c/6ccbda44e2cc3d26fd22af54c650d6d5d801addf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/76c4c22c2437d3d3880efc0f62eca06ef078d290",
          "url": "https://git.kernel.org/stable/c/76c4c22c2437d3d3880efc0f62eca06ef078d290"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c6936266f8bf98a53f28ef9a820e6a501e946d09",
          "url": "https://git.kernel.org/stable/c/c6936266f8bf98a53f28ef9a820e6a501e946d09"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c6f035044104c6ff656f4565cd22938dc892528c",
          "url": "https://git.kernel.org/stable/c/c6f035044104c6ff656f4565cd22938dc892528c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/da7936518996d290e2fcfcaf6cd7e15bfd87804a",
          "url": "https://git.kernel.org/stable/c/da7936518996d290e2fcfcaf6cd7e15bfd87804a"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-08T07:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38346",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Fix UAF when lookup kallsym after ftrace disabled\n\nThe following issue happens with a buggy module:\n\nBUG: unable to handle page fault for address: ffffffffc05d0218\nPGD 1bd66f067 P4D 1bd66f067 PUD 1bd671067 PMD 101808067 PTE 0\nOops: Oops: 0000 [#1] SMP KASAN PTI\nTainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\nRIP: 0010:sized_strscpy+0x81/0x2f0\nRSP: 0018:ffff88812d76fa08 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: ffffffffc0601010 RCX: dffffc0000000000\nRDX: 0000000000000038 RSI: dffffc0000000000 RDI: ffff88812608da2d\nRBP: 8080808080808080 R08: ffff88812608da2d R09: ffff88812608da68\nR10: ffff88812608d82d R11: ffff88812608d810 R12: 0000000000000038\nR13: ffff88812608da2d R14: ffffffffc05d0218 R15: fefefefefefefeff\nFS:  00007fef552de740(0000) GS:ffff8884251c7000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffffffc05d0218 CR3: 00000001146f0000 CR4: 00000000000006f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n ftrace_mod_get_kallsym+0x1ac/0x590\n update_iter_mod+0x239/0x5b0\n s_next+0x5b/0xa0\n seq_read_iter+0x8c9/0x1070\n seq_read+0x249/0x3b0\n proc_reg_read+0x1b0/0x280\n vfs_read+0x17f/0x920\n ksys_read+0xf3/0x1c0\n do_syscall_64+0x5f/0x2e0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nThe above issue may happen as follows:\n(1) Add kprobe tracepoint;\n(2) insmod test.ko;\n(3)  Module triggers ftrace disabled;\n(4) rmmod test.ko;\n(5) cat /proc/kallsyms; --> Will trigger UAF as test.ko already removed;\nftrace_mod_get_kallsym()\n...\nstrscpy(module_name, mod_map->mod->name, MODULE_NAME_LEN);\n...\n\nThe problem is when a module triggers an issue with ftrace and\nsets ftrace_disable. The ftrace_disable is set when an anomaly is\ndiscovered and to prevent any more damage, ftrace stops all text\nmodification. The issue that happened was that the ftrace_disable stops\nmore than just the text modification.\n\nWhen a module is loaded, its init functions can also be traced. Because\nkallsyms deletes the init functions after a module has loaded, ftrace\nsaves them when the module is loaded and function tracing is enabled. This\nallows the output of the function trace to show the init function names\ninstead of just their raw memory addresses.\n\nWhen a module is removed, ftrace_release_mod() is called, and if\nftrace_disable is set, it just returns without doing anything more. The\nproblem here is that it leaves the mod_list still around and if kallsyms\nis called, it will call into this code and access the module memory that\nhas already been freed as it will return:\n\n  strscpy(module_name, mod_map->mod->name, MODULE_NAME_LEN);\n\nWhere the \"mod\" no longer exists and triggers a UAF bug.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38346"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/03a162933c4a03b9f1a84f7d8482903c7e1e11bb",
          "url": "https://git.kernel.org/stable/c/03a162933c4a03b9f1a84f7d8482903c7e1e11bb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6805582abb720681dd1c87ff677f155dcf4e86c9",
          "url": "https://git.kernel.org/stable/c/6805582abb720681dd1c87ff677f155dcf4e86c9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/83a692a9792aa86249d68a8ac0b9d55ecdd255fa",
          "url": "https://git.kernel.org/stable/c/83a692a9792aa86249d68a8ac0b9d55ecdd255fa"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8690cd3258455bbae64f809e1d3ee0f043661c71",
          "url": "https://git.kernel.org/stable/c/8690cd3258455bbae64f809e1d3ee0f043661c71"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8e89c17dc8970c5f71a3a991f5724d4c8de42d8c",
          "url": "https://git.kernel.org/stable/c/8e89c17dc8970c5f71a3a991f5724d4c8de42d8c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d064c68781c19f378af1ae741d9132d35d24b2bb",
          "url": "https://git.kernel.org/stable/c/d064c68781c19f378af1ae741d9132d35d24b2bb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f78a786ad9a5443a29eef4dae60cde85b7375129",
          "url": "https://git.kernel.org/stable/c/f78a786ad9a5443a29eef4dae60cde85b7375129"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f914b52c379c12288b7623bb814d0508dbe7481d",
          "url": "https://git.kernel.org/stable/c/f914b52c379c12288b7623bb814d0508dbe7481d"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-10T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39683",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Limit access to parser->buffer when trace_get_user failed\n\nWhen the length of the string written to set_ftrace_filter exceeds\nFTRACE_BUFF_MAX, the following KASAN alarm will be triggered:\n\nBUG: KASAN: slab-out-of-bounds in strsep+0x18c/0x1b0\nRead of size 1 at addr ffff0000d00bd5ba by task ash/165\n\nCPU: 1 UID: 0 PID: 165 Comm: ash Not tainted 6.16.0-g6bcdbd62bd56-dirty\nHardware name: linux,dummy-virt (DT)\nCall trace:\n show_stack+0x34/0x50 (C)\n dump_stack_lvl+0xa0/0x158\n print_address_description.constprop.0+0x88/0x398\n print_report+0xb0/0x280\n kasan_report+0xa4/0xf0\n __asan_report_load1_noabort+0x20/0x30\n strsep+0x18c/0x1b0\n ftrace_process_regex.isra.0+0x100/0x2d8\n ftrace_regex_release+0x484/0x618\n __fput+0x364/0xa58\n ____fput+0x28/0x40\n task_work_run+0x154/0x278\n do_notify_resume+0x1f0/0x220\n el0_svc+0xec/0xf0\n el0t_64_sync_handler+0xa0/0xe8\n el0t_64_sync+0x1ac/0x1b0\n\nThe reason is that trace_get_user will fail when processing a string\nlonger than FTRACE_BUFF_MAX, but not set the end of parser->buffer to 0.\nThen an OOB access will be triggered in ftrace_regex_release->\nftrace_process_regex->strsep->strpbrk. We can solve this problem by\nlimiting access to parser->buffer when trace_get_user failed.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39683"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3079517a5ba80901fe828a06998da64b9b8749be",
          "url": "https://git.kernel.org/stable/c/3079517a5ba80901fe828a06998da64b9b8749be"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/418b448e1d7470da9d4d4797f71782595ee69c49",
          "url": "https://git.kernel.org/stable/c/418b448e1d7470da9d4d4797f71782595ee69c49"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/41b838420457802f21918df66764b6fbf829d330",
          "url": "https://git.kernel.org/stable/c/41b838420457802f21918df66764b6fbf829d330"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/58ff8064cb4c7eddac4da1a59da039ead586950a",
          "url": "https://git.kernel.org/stable/c/58ff8064cb4c7eddac4da1a59da039ead586950a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6a909ea83f226803ea0e718f6e88613df9234d58",
          "url": "https://git.kernel.org/stable/c/6a909ea83f226803ea0e718f6e88613df9234d58"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b842ef39c2ad6156c13afdec25ecc6792a9b67b9",
          "url": "https://git.kernel.org/stable/c/b842ef39c2ad6156c13afdec25ecc6792a9b67b9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d0c68045b8b0f3737ed7bd6b8c83b7887014adee",
          "url": "https://git.kernel.org/stable/c/d0c68045b8b0f3737ed7bd6b8c83b7887014adee"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-05T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38323",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atm: add lec_mutex\n\nsyzbot found its way in net/atm/lec.c, and found an error path\nin lecd_attach() could leave a dangling pointer in dev_lec[].\n\nAdd a mutex to protect dev_lecp[] uses from lecd_attach(),\nlec_vcc_attach() and lec_mcast_attach().\n\nFollowing patch will use this mutex for /proc/net/atm/lec.\n\nBUG: KASAN: slab-use-after-free in lecd_attach net/atm/lec.c:751 [inline]\nBUG: KASAN: slab-use-after-free in lane_ioctl+0x2224/0x23e0 net/atm/lec.c:1008\nRead of size 8 at addr ffff88807c7b8e68 by task syz.1.17/6142\n\nCPU: 1 UID: 0 PID: 6142 Comm: syz.1.17 Not tainted 6.16.0-rc1-syzkaller-00239-g08215f5486ec #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025\nCall Trace:\n <TASK>\n  __dump_stack lib/dump_stack.c:94 [inline]\n  dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120\n  print_address_description mm/kasan/report.c:408 [inline]\n  print_report+0xcd/0x680 mm/kasan/report.c:521\n  kasan_report+0xe0/0x110 mm/kasan/report.c:634\n  lecd_attach net/atm/lec.c:751 [inline]\n  lane_ioctl+0x2224/0x23e0 net/atm/lec.c:1008\n  do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159\n  sock_do_ioctl+0x118/0x280 net/socket.c:1190\n  sock_ioctl+0x227/0x6b0 net/socket.c:1311\n  vfs_ioctl fs/ioctl.c:51 [inline]\n  __do_sys_ioctl fs/ioctl.c:907 [inline]\n  __se_sys_ioctl fs/ioctl.c:893 [inline]\n  __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893\n  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n  do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n </TASK>\n\nAllocated by task 6132:\n  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47\n  kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n  __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394\n  kasan_kmalloc include/linux/kasan.h:260 [inline]\n  __do_kmalloc_node mm/slub.c:4328 [inline]\n  __kvmalloc_node_noprof+0x27b/0x620 mm/slub.c:5015\n  alloc_netdev_mqs+0xd2/0x1570 net/core/dev.c:11711\n  lecd_attach net/atm/lec.c:737 [inline]\n  lane_ioctl+0x17db/0x23e0 net/atm/lec.c:1008\n  do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159\n  sock_do_ioctl+0x118/0x280 net/socket.c:1190\n  sock_ioctl+0x227/0x6b0 net/socket.c:1311\n  vfs_ioctl fs/ioctl.c:51 [inline]\n  __do_sys_ioctl fs/ioctl.c:907 [inline]\n  __se_sys_ioctl fs/ioctl.c:893 [inline]\n  __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893\n  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n  do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFreed by task 6132:\n  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47\n  kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n  kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:576\n  poison_slab_object mm/kasan/common.c:247 [inline]\n  __kasan_slab_free+0x51/0x70 mm/kasan/common.c:264\n  kasan_slab_free include/linux/kasan.h:233 [inline]\n  slab_free_hook mm/slub.c:2381 [inline]\n  slab_free mm/slub.c:4643 [inline]\n  kfree+0x2b4/0x4d0 mm/slub.c:4842\n  free_netdev+0x6c5/0x910 net/core/dev.c:11892\n  lecd_attach net/atm/lec.c:744 [inline]\n  lane_ioctl+0x1ce8/0x23e0 net/atm/lec.c:1008\n  do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159\n  sock_do_ioctl+0x118/0x280 net/socket.c:1190\n  sock_ioctl+0x227/0x6b0 net/socket.c:1311\n  vfs_ioctl fs/ioctl.c:51 [inline]\n  __do_sys_ioctl fs/ioctl.c:907 [inline]\n  __se_sys_ioctl fs/ioctl.c:893 [inline]\n  __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38323"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/17e156a94e94a906a570dbf9b48877956c60bef8",
          "url": "https://git.kernel.org/stable/c/17e156a94e94a906a570dbf9b48877956c60bef8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/18e8f0c4f826fb08c2d3825cdd6c57e24b207e0a",
          "url": "https://git.kernel.org/stable/c/18e8f0c4f826fb08c2d3825cdd6c57e24b207e0a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/64b378db28a967f7b271b055380c2360279aa424",
          "url": "https://git.kernel.org/stable/c/64b378db28a967f7b271b055380c2360279aa424"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a7a713dfb5f9477345450f27c7c0741864511192",
          "url": "https://git.kernel.org/stable/c/a7a713dfb5f9477345450f27c7c0741864511192"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d13a3824bfd2b4774b671a75cf766a16637a0e67",
          "url": "https://git.kernel.org/stable/c/d13a3824bfd2b4774b671a75cf766a16637a0e67"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dffd03422ae6a459039c8602f410e6c0f4cbc6c8",
          "url": "https://git.kernel.org/stable/c/dffd03422ae6a459039c8602f410e6c0f4cbc6c8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e91274cc7ed88ab5bdc62d426067c82b0b118a0b",
          "url": "https://git.kernel.org/stable/c/e91274cc7ed88ab5bdc62d426067c82b0b118a0b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f4d80b16ecc4229f7e6345158ef34c36be323f0e",
          "url": "https://git.kernel.org/stable/c/f4d80b16ecc4229f7e6345158ef34c36be323f0e"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-10T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39685",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: pcl726: Prevent invalid irq number\n\nThe reproducer passed in an irq number(0x80008000) that was too large,\nwhich triggered the oob.\n\nAdded an interrupt number check to prevent users from passing in an irq\nnumber that was too large.\n\nIf `it->options[1]` is 31, then `1 << it->options[1]` is still invalid\nbecause it shifts a 1-bit into the sign bit (which is UB in C).\nPossible solutions include reducing the upper bound on the\n`it->options[1]` value to 30 or lower, or using `1U << it->options[1]`.\n\nThe old code would just not attempt to request the IRQ if the\n`options[1]` value were invalid.  And it would still configure the\ndevice without interrupts even if the call to `request_irq` returned an\nerror.  So it would be better to combine this test with the test below.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39685"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0eb4ed2aa261dee228f1668dbfa6d87353e8162d",
          "url": "https://git.kernel.org/stable/c/0eb4ed2aa261dee228f1668dbfa6d87353e8162d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5a33d07c94ba91306093e823112a7aa9727549f6",
          "url": "https://git.kernel.org/stable/c/5a33d07c94ba91306093e823112a7aa9727549f6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/96cb948408b3adb69df7e451ba7da9d21f814d00",
          "url": "https://git.kernel.org/stable/c/96cb948408b3adb69df7e451ba7da9d21f814d00"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a3cfcd0c78c80ca7cd80372dc28f77d01be57bf6",
          "url": "https://git.kernel.org/stable/c/a3cfcd0c78c80ca7cd80372dc28f77d01be57bf6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bab220b0bb5af652007e278e8e8357f952b0e1ea",
          "url": "https://git.kernel.org/stable/c/bab220b0bb5af652007e278e8e8357f952b0e1ea"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d8992c9a01f81128f36acb7c5755530e21fcd059",
          "url": "https://git.kernel.org/stable/c/d8992c9a01f81128f36acb7c5755530e21fcd059"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-05T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53090",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdkfd: Fix an illegal memory access\n\nIn the kfd_wait_on_events() function, the kfd_event_waiter structure is\nallocated by alloc_event_waiters(), but the event field of the waiter\nstructure is not initialized; When copy_from_user() fails in the\nkfd_wait_on_events() function, it will enter exception handling to\nrelease the previously allocated memory of the waiter structure;\nDue to the event field of the waiters structure being accessed\nin the free_waiters() function, this results in illegal memory access\nand system crash, here is the crash log:\n\nlocalhost kernel: RIP: 0010:native_queued_spin_lock_slowpath+0x185/0x1e0\nlocalhost kernel: RSP: 0018:ffffaa53c362bd60 EFLAGS: 00010082\nlocalhost kernel: RAX: ff3d3d6bff4007cb RBX: 0000000000000282 RCX: 00000000002c0000\nlocalhost kernel: RDX: ffff9e855eeacb80 RSI: 000000000000279c RDI: ffffe7088f6a21d0\nlocalhost kernel: RBP: ffffe7088f6a21d0 R08: 00000000002c0000 R09: ffffaa53c362be64\nlocalhost kernel: R10: ffffaa53c362bbd8 R11: 0000000000000001 R12: 0000000000000002\nlocalhost kernel: R13: ffff9e7ead15d600 R14: 0000000000000000 R15: ffff9e7ead15d698\nlocalhost kernel: FS:  0000152a3d111700(0000) GS:ffff9e855ee80000(0000) knlGS:0000000000000000\nlocalhost kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nlocalhost kernel: CR2: 0000152938000010 CR3: 000000044d7a4000 CR4: 00000000003506e0\nlocalhost kernel: Call Trace:\nlocalhost kernel: _raw_spin_lock_irqsave+0x30/0x40\nlocalhost kernel: remove_wait_queue+0x12/0x50\nlocalhost kernel: kfd_wait_on_events+0x1b6/0x490 [hydcu]\nlocalhost kernel: ? ftrace_graph_caller+0xa0/0xa0\nlocalhost kernel: kfd_ioctl+0x38c/0x4a0 [hydcu]\nlocalhost kernel: ? kfd_ioctl_set_trap_handler+0x70/0x70 [hydcu]\nlocalhost kernel: ? kfd_ioctl_create_queue+0x5a0/0x5a0 [hydcu]\nlocalhost kernel: ? ftrace_graph_caller+0xa0/0xa0\nlocalhost kernel: __x64_sys_ioctl+0x8e/0xd0\nlocalhost kernel: ? syscall_trace_enter.isra.18+0x143/0x1b0\nlocalhost kernel: do_syscall_64+0x33/0x80\nlocalhost kernel: entry_SYSCALL_64_after_hwframe+0x44/0xa9\nlocalhost kernel: RIP: 0033:0x152a4dff68d7\n\nAllocate the structure with kcalloc, and remove redundant 0-initialization\nand a redundant loop condition check.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53090"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2fece63b55c5d74cd6f5de51159e2cde37e10555",
          "url": "https://git.kernel.org/stable/c/2fece63b55c5d74cd6f5de51159e2cde37e10555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4fc8fff378b2f2039f2a666d9f8c570f4e58352c",
          "url": "https://git.kernel.org/stable/c/4fc8fff378b2f2039f2a666d9f8c570f4e58352c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5a3fb3b745af0ce46ec2e0c8e507bae45b937334",
          "url": "https://git.kernel.org/stable/c/5a3fb3b745af0ce46ec2e0c8e507bae45b937334"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/61f306f8df0d5559659c5578cf6d95236bcdcb25",
          "url": "https://git.kernel.org/stable/c/61f306f8df0d5559659c5578cf6d95236bcdcb25"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6936525142a015e854d0a23e9ad9ea0a28b3843d",
          "url": "https://git.kernel.org/stable/c/6936525142a015e854d0a23e9ad9ea0a28b3843d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bbf5eada4334a96e3a204b2307ff5b14dc380b0b",
          "url": "https://git.kernel.org/stable/c/bbf5eada4334a96e3a204b2307ff5b14dc380b0b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d9923e7214a870b312bf61f6a89c7554d0966985",
          "url": "https://git.kernel.org/stable/c/d9923e7214a870b312bf61f6a89c7554d0966985"
        }
      ],
      "release_date": "2025-05-02T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49980",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: gadget: Fix use-after-free Read in usb_udc_uevent()\n\nThe syzbot fuzzer found a race between uevent callbacks and gadget\ndriver unregistration that can cause a use-after-free bug:\n\n---------------------------------------------------------------\nBUG: KASAN: use-after-free in usb_udc_uevent+0x11f/0x130\ndrivers/usb/gadget/udc/core.c:1732\nRead of size 8 at addr ffff888078ce2050 by task udevd/2968\n\nCPU: 1 PID: 2968 Comm: udevd Not tainted 5.19.0-rc4-next-20220628-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google\n06/29/2022\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:317 [inline]\n print_report.cold+0x2ba/0x719 mm/kasan/report.c:433\n kasan_report+0xbe/0x1f0 mm/kasan/report.c:495\n usb_udc_uevent+0x11f/0x130 drivers/usb/gadget/udc/core.c:1732\n dev_uevent+0x290/0x770 drivers/base/core.c:2424\n---------------------------------------------------------------\n\nThe bug occurs because usb_udc_uevent() dereferences udc->driver but\ndoes so without acquiring the udc_lock mutex, which protects this\nfield.  If the gadget driver is unbound from the udc concurrently with\nuevent processing, the driver structure may be accessed after it has\nbeen deallocated.\n\nTo prevent the race, we make sure that the routine holds the mutex\naround the racing accesses.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49980"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2191c00855b03aa59c20e698be713d952d51fc18",
          "url": "https://git.kernel.org/stable/c/2191c00855b03aa59c20e698be713d952d51fc18"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f44b0b95d50fffeca036e1ba36770390e0b519dd",
          "url": "https://git.kernel.org/stable/c/f44b0b95d50fffeca036e1ba36770390e0b519dd"
        }
      ],
      "release_date": "2025-06-18T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38103",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse()\n\nUpdate struct hid_descriptor to better reflect the mandatory and\noptional parts of the HID Descriptor as per USB HID 1.11 specification.\nNote: the kernel currently does not parse any optional HID class\ndescriptors, only the mandatory report descriptor.\n\nUpdate all references to member element desc[0] to rpt_desc.\n\nAdd test to verify bLength and bNumDescriptors values are valid.\n\nReplace the for loop with direct access to the mandatory HID class\ndescriptor member for the report descriptor. This eliminates the\npossibility of getting an out-of-bounds fault.\n\nAdd a warning message if the HID descriptor contains any unsupported\noptional HID class descriptors.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38103"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1df80d748f984290c895e843401824215dcfbfb0",
          "url": "https://git.kernel.org/stable/c/1df80d748f984290c895e843401824215dcfbfb0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/41827a2dbdd7880df9881506dee13bc88d4230bb",
          "url": "https://git.kernel.org/stable/c/41827a2dbdd7880df9881506dee13bc88d4230bb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/485e1b741eb838cbe1d6b0e81e5ab62ae6c095cf",
          "url": "https://git.kernel.org/stable/c/485e1b741eb838cbe1d6b0e81e5ab62ae6c095cf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4fa7831cf0ac71a0a345369d1a6084f2b096e55e",
          "url": "https://git.kernel.org/stable/c/4fa7831cf0ac71a0a345369d1a6084f2b096e55e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/74388368927e9c52a69524af5bbd6c55eb4690de",
          "url": "https://git.kernel.org/stable/c/74388368927e9c52a69524af5bbd6c55eb4690de"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7a6d6b68db128da2078ccd9a751dfa3f75c9cf5b",
          "url": "https://git.kernel.org/stable/c/7a6d6b68db128da2078ccd9a751dfa3f75c9cf5b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a8f842534807985d3a676006d140541b87044345",
          "url": "https://git.kernel.org/stable/c/a8f842534807985d3a676006d140541b87044345"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fe7f7ac8e0c708446ff017453add769ffc15deed",
          "url": "https://git.kernel.org/stable/c/fe7f7ac8e0c708446ff017453add769ffc15deed"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-03T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53138",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: caif: Fix use-after-free in cfusbl_device_notify()\n\nsyzbot reported use-after-free in cfusbl_device_notify() [1].  This\ncauses a stack trace like below:\n\nBUG: KASAN: use-after-free in cfusbl_device_notify+0x7c9/0x870 net/caif/caif_usb.c:138\nRead of size 8 at addr ffff88807ac4e6f0 by task kworker/u4:6/1214\n\nCPU: 0 PID: 1214 Comm: kworker/u4:6 Not tainted 5.19.0-rc3-syzkaller-00146-g92f20ff72066 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nWorkqueue: netns cleanup_net\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\n print_address_description.constprop.0.cold+0xeb/0x467 mm/kasan/report.c:313\n print_report mm/kasan/report.c:429 [inline]\n kasan_report.cold+0xf4/0x1c6 mm/kasan/report.c:491\n cfusbl_device_notify+0x7c9/0x870 net/caif/caif_usb.c:138\n notifier_call_chain+0xb5/0x200 kernel/notifier.c:87\n call_netdevice_notifiers_info+0xb5/0x130 net/core/dev.c:1945\n call_netdevice_notifiers_extack net/core/dev.c:1983 [inline]\n call_netdevice_notifiers net/core/dev.c:1997 [inline]\n netdev_wait_allrefs_any net/core/dev.c:10227 [inline]\n netdev_run_todo+0xbc0/0x10f0 net/core/dev.c:10341\n default_device_exit_batch+0x44e/0x590 net/core/dev.c:11334\n ops_exit_list+0x125/0x170 net/core/net_namespace.c:167\n cleanup_net+0x4ea/0xb00 net/core/net_namespace.c:594\n process_one_work+0x996/0x1610 kernel/workqueue.c:2289\n worker_thread+0x665/0x1080 kernel/workqueue.c:2436\n kthread+0x2e9/0x3a0 kernel/kthread.c:376\n ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:302\n </TASK>\n\nWhen unregistering a net device, unregister_netdevice_many_notify()\nsets the device's reg_state to NETREG_UNREGISTERING, calls notifiers\nwith NETDEV_UNREGISTER, and adds the device to the todo list.\n\nLater on, devices in the todo list are processed by netdev_run_todo().\nnetdev_run_todo() waits devices' reference count become 1 while\nrebdoadcasting NETDEV_UNREGISTER notification.\n\nWhen cfusbl_device_notify() is called with NETDEV_UNREGISTER multiple\ntimes, the parent device might be freed.  This could cause UAF.\nProcessing NETDEV_UNREGISTER multiple times also causes inbalance of\nreference count for the module.\n\nThis patch fixes the issue by accepting only first NETDEV_UNREGISTER\nnotification.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53138"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1793da97a23e31c5bf06631f3f3e5a25f368fd64",
          "url": "https://git.kernel.org/stable/c/1793da97a23e31c5bf06631f3f3e5a25f368fd64"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/287027d8a567168a5d8ce5cb0cba16a34791a48c",
          "url": "https://git.kernel.org/stable/c/287027d8a567168a5d8ce5cb0cba16a34791a48c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3f14457e1584224f4296af613bbd99deb60b5d91",
          "url": "https://git.kernel.org/stable/c/3f14457e1584224f4296af613bbd99deb60b5d91"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/68a45c3cf0e2242a533657f4f535d9b6a7447a79",
          "url": "https://git.kernel.org/stable/c/68a45c3cf0e2242a533657f4f535d9b6a7447a79"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9781e98a97110f5e76999058368b4be76a788484",
          "url": "https://git.kernel.org/stable/c/9781e98a97110f5e76999058368b4be76a788484"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9dc16be373b382ddd4c274052a6e870a95e76c01",
          "url": "https://git.kernel.org/stable/c/9dc16be373b382ddd4c274052a6e870a95e76c01"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c3aaec463a632cf4187dc017e421bfa69d7834a9",
          "url": "https://git.kernel.org/stable/c/c3aaec463a632cf4187dc017e421bfa69d7834a9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d1a11bbdbb5ea9f172019c5a4a3e9d8eabd72179",
          "url": "https://git.kernel.org/stable/c/d1a11bbdbb5ea9f172019c5a4a3e9d8eabd72179"
        }
      ],
      "release_date": "2025-05-02T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-43883",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: vhci-hcd: Do not drop references before new references are gained\n\nAt a few places the driver carries stale pointers\nto references that can still be used. Make sure that does not happen.\nThis strictly speaking closes ZDI-CAN-22273, though there may be\nsimilar races in the driver.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-43883"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/128e82e41cf7d74a562726c1587d9d2ede1a0a37",
          "url": "https://git.kernel.org/stable/c/128e82e41cf7d74a562726c1587d9d2ede1a0a37"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4dacdb9720aaab10b6be121eae55820174d97174",
          "url": "https://git.kernel.org/stable/c/4dacdb9720aaab10b6be121eae55820174d97174"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/585e6bc7d0a9bf73a8be3d3fb34e86b90cc61a14",
          "url": "https://git.kernel.org/stable/c/585e6bc7d0a9bf73a8be3d3fb34e86b90cc61a14"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5a3c473b28ae1c1f7c4dc129e30cb19ae6e96f89",
          "url": "https://git.kernel.org/stable/c/5a3c473b28ae1c1f7c4dc129e30cb19ae6e96f89"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9c3746ce8d8fcb3a2405644fc0eec7fc5312de80",
          "url": "https://git.kernel.org/stable/c/9c3746ce8d8fcb3a2405644fc0eec7fc5312de80"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/afdcfd3d6fcdeca2735ca8d994c5f2d24a368f0a",
          "url": "https://git.kernel.org/stable/c/afdcfd3d6fcdeca2735ca8d994c5f2d24a368f0a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c3d0857b7fc2c49f68f89128a5440176089a8f54",
          "url": "https://git.kernel.org/stable/c/c3d0857b7fc2c49f68f89128a5440176089a8f54"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e8c1e606dab8c56cf074b43b98d0805de7322ba2",
          "url": "https://git.kernel.org/stable/c/e8c1e606dab8c56cf074b43b98d0805de7322ba2"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
        }
      ],
      "release_date": "2024-08-23T13:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53373",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: seqiv - Handle EBUSY correctly\n\nAs it is seqiv only handles the special return value of EINPROGERSS,\nwhich means that in all other cases it will free data related to the\nrequest.\n\nHowever, as the caller of seqiv may specify MAY_BACKLOG, we also need\nto expect EBUSY and treat it in the same way.  Otherwise backlogged\nrequests will trigger a use-after-free.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53373"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1effbddaff60eeef8017c6dea1ee0ed970164d14",
          "url": "https://git.kernel.org/stable/c/1effbddaff60eeef8017c6dea1ee0ed970164d14"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/32e62025e5e52fbe4812ef044759de7010b15dbc",
          "url": "https://git.kernel.org/stable/c/32e62025e5e52fbe4812ef044759de7010b15dbc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/36ec108b7bd7e280edb22de028467bd09d644620",
          "url": "https://git.kernel.org/stable/c/36ec108b7bd7e280edb22de028467bd09d644620"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4d497e8b200a175094e0ac252ed878add39b8771",
          "url": "https://git.kernel.org/stable/c/4d497e8b200a175094e0ac252ed878add39b8771"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/63551e4b7cbcd9914258827699eb2cb6ed6e4a16",
          "url": "https://git.kernel.org/stable/c/63551e4b7cbcd9914258827699eb2cb6ed6e4a16"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9477db935eb690f697d9bcc4f608927841bc8b36",
          "url": "https://git.kernel.org/stable/c/9477db935eb690f697d9bcc4f608927841bc8b36"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ae849d2f48019ff9c104e32bf588ccbfb200e971",
          "url": "https://git.kernel.org/stable/c/ae849d2f48019ff9c104e32bf588ccbfb200e971"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cc4d0d4251748a8a68026938f4055d2ac47c5719",
          "url": "https://git.kernel.org/stable/c/cc4d0d4251748a8a68026938f4055d2ac47c5719"
        }
      ],
      "release_date": "2025-09-18T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39817",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nefivarfs: Fix slab-out-of-bounds in efivarfs_d_compare\n\nObserved on kernel 6.6 (present on master as well):\n\n  BUG: KASAN: slab-out-of-bounds in memcmp+0x98/0xd0\n  Call trace:\n   kasan_check_range+0xe8/0x190\n   __asan_loadN+0x1c/0x28\n   memcmp+0x98/0xd0\n   efivarfs_d_compare+0x68/0xd8\n   __d_lookup_rcu_op_compare+0x178/0x218\n   __d_lookup_rcu+0x1f8/0x228\n   d_alloc_parallel+0x150/0x648\n   lookup_open.isra.0+0x5f0/0x8d0\n   open_last_lookups+0x264/0x828\n   path_openat+0x130/0x3f8\n   do_filp_open+0x114/0x248\n   do_sys_openat2+0x340/0x3c0\n   __arm64_sys_openat+0x120/0x1a0\n\nIf dentry->d_name.len < EFI_VARIABLE_GUID_LEN , 'guid' can become\nnegative, leadings to oob. The issue can be triggered by parallel\nlookups using invalid filename:\n\n  T1\t\t\tT2\n  lookup_open\n   ->lookup\n    simple_lookup\n     d_add\n     // invalid dentry is added to hash list\n\n\t\t\tlookup_open\n\t\t\t d_alloc_parallel\n\t\t\t  __d_lookup_rcu\n\t\t\t   __d_lookup_rcu_op_compare\n\t\t\t    hlist_bl_for_each_entry_rcu\n\t\t\t    // invalid dentry can be retrieved\n\t\t\t     ->d_compare\n\t\t\t      efivarfs_d_compare\n\t\t\t      // oob\n\nFix it by checking 'guid' before cmp.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39817"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0f63fbabeaaaaaaf5b742a2f4c1b4590d50bf1f6",
          "url": "https://git.kernel.org/stable/c/0f63fbabeaaaaaaf5b742a2f4c1b4590d50bf1f6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/568e7761279b99c6daa3002290fd6d8047ddb6d2",
          "url": "https://git.kernel.org/stable/c/568e7761279b99c6daa3002290fd6d8047ddb6d2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/71581a82f38e5a4d807d71fc1bb59aead80ccf95",
          "url": "https://git.kernel.org/stable/c/71581a82f38e5a4d807d71fc1bb59aead80ccf95"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/794399019301944fd6d2e0d7a51b3327e26c410e",
          "url": "https://git.kernel.org/stable/c/794399019301944fd6d2e0d7a51b3327e26c410e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/925599eba46045930b850a98ae594d2e3028ac40",
          "url": "https://git.kernel.org/stable/c/925599eba46045930b850a98ae594d2e3028ac40"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a6358f8cf64850f3f27857b8ed8c1b08cfc4685c",
          "url": "https://git.kernel.org/stable/c/a6358f8cf64850f3f27857b8ed8c1b08cfc4685c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c2925cd6207079c3f4d040d082515db78d63afbf",
          "url": "https://git.kernel.org/stable/c/c2925cd6207079c3f4d040d082515db78d63afbf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d7f5e35e70507d10cbaff5f9e194ed54c4ee14f7",
          "url": "https://git.kernel.org/stable/c/d7f5e35e70507d10cbaff5f9e194ed54c4ee14f7"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-16T13:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37882",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: xhci: Fix isochronous Ring Underrun/Overrun event handling\n\nThe TRB pointer of these events points at enqueue at the time of error\noccurrence on xHCI 1.1+ HCs or it's NULL on older ones. By the time we\nare handling the event, a new TD may be queued at this ring position.\n\nI can trigger this race by rising interrupt moderation to increase IRQ\nhandling delay. Similar delay may occur naturally due to system load.\n\nIf this ever happens after a Missed Service Error, missed TDs will be\nskipped and the new TD processed as if it matched the event. It could\nbe given back prematurely, risking data loss or buffer UAF by the xHC.\n\nDon't complete TDs on xrun events and don't warn if queued TDs don't\nmatch the event's TRB pointer, which can be NULL or a link/no-op TRB.\nDon't warn if there are no queued TDs at all.\n\nNow that it's safe, also handle xrun events if the skip flag is clear.\nThis ensures completion of any TD stuck in 'error mid TD' state right\nbefore the xrun event, which could happen if a driver submits a finite\nnumber of URBs to a buggy HC and then an error occurs on the last TD.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37882"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/16a7a8e6c47fea5c847beb696c8c21a7a44c1915",
          "url": "https://git.kernel.org/stable/c/16a7a8e6c47fea5c847beb696c8c21a7a44c1915"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/39a080a2925c81b0f1da0add44722ef2b78e5454",
          "url": "https://git.kernel.org/stable/c/39a080a2925c81b0f1da0add44722ef2b78e5454"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/906dec15b9b321b546fd31a3c99ffc13724c7af4",
          "url": "https://git.kernel.org/stable/c/906dec15b9b321b546fd31a3c99ffc13724c7af4"
        }
      ],
      "release_date": "2025-05-09T07:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38702",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: fix potential buffer overflow in do_register_framebuffer()\n\nThe current implementation may lead to buffer overflow when:\n1.  Unregistration creates NULL gaps in registered_fb[]\n2.  All array slots become occupied despite num_registered_fb < FB_MAX\n3.  The registration loop exceeds array bounds\n\nAdd boundary check to prevent registered_fb[FB_MAX] access.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38702"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/248b2aab9b2af5ecf89d9d7955a2ff20c4b4a399",
          "url": "https://git.kernel.org/stable/c/248b2aab9b2af5ecf89d9d7955a2ff20c4b4a399"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2828a433c7d7a05b6f27c8148502095101dd0b09",
          "url": "https://git.kernel.org/stable/c/2828a433c7d7a05b6f27c8148502095101dd0b09"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/523b84dc7ccea9c4d79126d6ed1cf9033cf83b05",
          "url": "https://git.kernel.org/stable/c/523b84dc7ccea9c4d79126d6ed1cf9033cf83b05"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5c3f5a25c62230b7965804ce7a2e9305c3ca3961",
          "url": "https://git.kernel.org/stable/c/5c3f5a25c62230b7965804ce7a2e9305c3ca3961"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/806f85bdd3a60187c21437fc51baace11f659f35",
          "url": "https://git.kernel.org/stable/c/806f85bdd3a60187c21437fc51baace11f659f35"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cbe740de32bb0fb7a5213731ff5f26ea6718fca3",
          "url": "https://git.kernel.org/stable/c/cbe740de32bb0fb7a5213731ff5f26ea6718fca3"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39860",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix use-after-free in l2cap_sock_cleanup_listen()\n\nsyzbot reported the splat below without a repro.\n\nIn the splat, a single thread calling bt_accept_dequeue() freed sk\nand touched it after that.\n\nThe root cause would be the racy l2cap_sock_cleanup_listen() call\nadded by the cited commit.\n\nbt_accept_dequeue() is called under lock_sock() except for\nl2cap_sock_release().\n\nTwo threads could see the same socket during the list iteration\nin bt_accept_dequeue():\n\n  CPU1                        CPU2 (close())\n  ----                        ----\n  sock_hold(sk)               sock_hold(sk);\n  lock_sock(sk)   <-- block close()\n  sock_put(sk)\n  bt_accept_unlink(sk)\n    sock_put(sk)  <-- refcnt by bt_accept_enqueue()\n  release_sock(sk)\n                              lock_sock(sk)\n                              sock_put(sk)\n                              bt_accept_unlink(sk)\n                                sock_put(sk)        <-- last refcnt\n                              bt_accept_unlink(sk)  <-- UAF\n\nDepending on the timing, the other thread could show up in the\n\"Freed by task\" part.\n\nLet's call l2cap_sock_cleanup_listen() under lock_sock() in\nl2cap_sock_release().\n\n[0]:\nBUG: KASAN: slab-use-after-free in debug_spin_lock_before kernel/locking/spinlock_debug.c:86 [inline]\nBUG: KASAN: slab-use-after-free in do_raw_spin_lock+0x26f/0x2b0 kernel/locking/spinlock_debug.c:115\nRead of size 4 at addr ffff88803b7eb1c4 by task syz.5.3276/16995\nCPU: 3 UID: 0 PID: 16995 Comm: syz.5.3276 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xcd/0x630 mm/kasan/report.c:482\n kasan_report+0xe0/0x110 mm/kasan/report.c:595\n debug_spin_lock_before kernel/locking/spinlock_debug.c:86 [inline]\n do_raw_spin_lock+0x26f/0x2b0 kernel/locking/spinlock_debug.c:115\n spin_lock_bh include/linux/spinlock.h:356 [inline]\n release_sock+0x21/0x220 net/core/sock.c:3746\n bt_accept_dequeue+0x505/0x600 net/bluetooth/af_bluetooth.c:312\n l2cap_sock_cleanup_listen+0x5c/0x2a0 net/bluetooth/l2cap_sock.c:1451\n l2cap_sock_release+0x5c/0x210 net/bluetooth/l2cap_sock.c:1425\n __sock_release+0xb3/0x270 net/socket.c:649\n sock_close+0x1c/0x30 net/socket.c:1439\n __fput+0x3ff/0xb70 fs/file_table.c:468\n task_work_run+0x14d/0x240 kernel/task_work.c:227\n resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]\n exit_to_user_mode_loop+0xeb/0x110 kernel/entry/common.c:43\n exit_to_user_mode_prepare include/linux/irq-entry-common.h:225 [inline]\n syscall_exit_to_user_mode_work include/linux/entry-common.h:175 [inline]\n syscall_exit_to_user_mode include/linux/entry-common.h:210 [inline]\n do_syscall_64+0x3f6/0x4c0 arch/x86/entry/syscall_64.c:100\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f2accf8ebe9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007ffdb6cb1378 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4\nRAX: 0000000000000000 RBX: 00000000000426fb RCX: 00007f2accf8ebe9\nRDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003\nRBP: 00007f2acd1b7da0 R08: 0000000000000001 R09: 00000012b6cb166f\nR10: 0000001b30e20000 R11: 0000000000000246 R12: 00007f2acd1b609c\nR13: 00007f2acd1b6090 R14: ffffffffffffffff R15: 00007ffdb6cb1490\n </TASK>\n\nAllocated by task 5326:\n kasan_save_stack+0x33/0x60 mm/kasan/common.c:47\n kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:388 [inline]\n __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:405\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __do_kmalloc_node mm/slub.c:4365 [inline]\n __kmalloc_nopro\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39860"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2ca99fc3512a8074de20ee52a87b492dfcc41a4d",
          "url": "https://git.kernel.org/stable/c/2ca99fc3512a8074de20ee52a87b492dfcc41a4d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/306b0991413b482dbf5585b423022123bb505966",
          "url": "https://git.kernel.org/stable/c/306b0991413b482dbf5585b423022123bb505966"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3dff390f55ccd9ce12e91233849769b5312180c2",
          "url": "https://git.kernel.org/stable/c/3dff390f55ccd9ce12e91233849769b5312180c2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/47f6090bcf75c369695d21c3f179db8a56bbbd49",
          "url": "https://git.kernel.org/stable/c/47f6090bcf75c369695d21c3f179db8a56bbbd49"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6077d16b5c0f65d571eee709de2f0541fb5ef0ca",
          "url": "https://git.kernel.org/stable/c/6077d16b5c0f65d571eee709de2f0541fb5ef0ca"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/83e1d9892ef51785cf0760b7681436760dda435a",
          "url": "https://git.kernel.org/stable/c/83e1d9892ef51785cf0760b7681436760dda435a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/862c628108562d8c7a516a900034823b381d3cba",
          "url": "https://git.kernel.org/stable/c/862c628108562d8c7a516a900034823b381d3cba"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/964cbb198f9c46c2b2358cd1faffc04c1e8248cf",
          "url": "https://git.kernel.org/stable/c/964cbb198f9c46c2b2358cd1faffc04c1e8248cf"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-19T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53116",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: avoid potential UAF in nvmet_req_complete()\n\nAn nvme target ->queue_response() operation implementation may free the\nrequest passed as argument. Such implementation potentially could result\nin a use after free of the request pointer when percpu_ref_put() is\ncalled in nvmet_req_complete().\n\nAvoid such problem by using a local variable to save the sq pointer\nbefore calling __nvmet_req_complete(), thus avoiding dereferencing the\nreq pointer after that function call.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53116"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/04c394208831d5e0d5cfee46722eb0f033cd4083",
          "url": "https://git.kernel.org/stable/c/04c394208831d5e0d5cfee46722eb0f033cd4083"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6173a77b7e9d3e202bdb9897b23f2a8afe7bf286",
          "url": "https://git.kernel.org/stable/c/6173a77b7e9d3e202bdb9897b23f2a8afe7bf286"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8ed9813871038b25a934b21ab76b5b7dbf44fc3a",
          "url": "https://git.kernel.org/stable/c/8ed9813871038b25a934b21ab76b5b7dbf44fc3a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a6317235da8aa7cb97529ebc8121cc2a4c4c437a",
          "url": "https://git.kernel.org/stable/c/a6317235da8aa7cb97529ebc8121cc2a4c4c437a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bcd535f07c58342302a2cd2bdd8894fe0872c8a9",
          "url": "https://git.kernel.org/stable/c/bcd535f07c58342302a2cd2bdd8894fe0872c8a9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e5d99b29012bbf0e86929403209723b2806500c1",
          "url": "https://git.kernel.org/stable/c/e5d99b29012bbf0e86929403209723b2806500c1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f1d5888a5efe345b63c430b256e95acb0a475642",
          "url": "https://git.kernel.org/stable/c/f1d5888a5efe345b63c430b256e95acb0a475642"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fafcb4b26393870c45462f9af6a48e581dbbcf7e",
          "url": "https://git.kernel.org/stable/c/fafcb4b26393870c45462f9af6a48e581dbbcf7e"
        }
      ],
      "release_date": "2025-05-02T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38529",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: aio_iiro_16: Fix bit shift out of bounds\n\nWhen checking for a supported IRQ number, the following test is used:\n\n\tif ((1 << it->options[1]) & 0xdcfc) {\n\nHowever, `it->options[i]` is an unchecked `int` value from userspace, so\nthe shift amount could be negative or out of bounds.  Fix the test by\nrequiring `it->options[1]` to be within bounds before proceeding with\nthe original test.  Valid `it->options[1]` values that select the IRQ\nwill be in the range [1,15]. The value 0 explicitly disables the use of\ninterrupts.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38529"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/43ddd82e6a91913cea1c078e782afd8de60c3a53",
          "url": "https://git.kernel.org/stable/c/43ddd82e6a91913cea1c078e782afd8de60c3a53"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5ac7c60439236fb691b8c7987390e2327bbf18fa",
          "url": "https://git.kernel.org/stable/c/5ac7c60439236fb691b8c7987390e2327bbf18fa"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/66acb1586737a22dd7b78abc63213b1bcaa100e4",
          "url": "https://git.kernel.org/stable/c/66acb1586737a22dd7b78abc63213b1bcaa100e4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/955e8835855fed8e87f7d8c8075564a1746c1b4c",
          "url": "https://git.kernel.org/stable/c/955e8835855fed8e87f7d8c8075564a1746c1b4c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a88692245c315bf8e225f205297a6f4b13d6856a",
          "url": "https://git.kernel.org/stable/c/a88692245c315bf8e225f205297a6f4b13d6856a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c593215385f0c0163015cca4512ed3ff42875d19",
          "url": "https://git.kernel.org/stable/c/c593215385f0c0163015cca4512ed3ff42875d19"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e0f3c0867d7d231c70984f05c97752caacd0daba",
          "url": "https://git.kernel.org/stable/c/e0f3c0867d7d231c70984f05c97752caacd0daba"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ff30dd3f15f443d2a0085b12ec2cc95d44f35fa7",
          "url": "https://git.kernel.org/stable/c/ff30dd3f15f443d2a0085b12ec2cc95d44f35fa7"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-08-16T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39839",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbatman-adv: fix OOB read/write in network-coding decode\n\nbatadv_nc_skb_decode_packet() trusts coded_len and checks only against\nskb->len. XOR starts at sizeof(struct batadv_unicast_packet), reducing\npayload headroom, and the source skb length is not verified, allowing an\nout-of-bounds read and a small out-of-bounds write.\n\nValidate that coded_len fits within the payload area of both destination\nand source sk_buffs before XORing.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39839"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1e36c6c8dc8023b4bbe9a16e819f9998b9b6a183",
          "url": "https://git.kernel.org/stable/c/1e36c6c8dc8023b4bbe9a16e819f9998b9b6a183"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/20080709457bc1e920eb002483d7d981d9b2ac1c",
          "url": "https://git.kernel.org/stable/c/20080709457bc1e920eb002483d7d981d9b2ac1c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/30fc47248f02b8a14a61df469e1da4704be1a19f",
          "url": "https://git.kernel.org/stable/c/30fc47248f02b8a14a61df469e1da4704be1a19f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5d334bce9fad58cf328d8fa14ea1fff855819863",
          "url": "https://git.kernel.org/stable/c/5d334bce9fad58cf328d8fa14ea1fff855819863"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a67c6397fcb7e842d3c595243049940970541c48",
          "url": "https://git.kernel.org/stable/c/a67c6397fcb7e842d3c595243049940970541c48"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bb37252c9af1cb250f34735ee98f80b46be3cef1",
          "url": "https://git.kernel.org/stable/c/bb37252c9af1cb250f34735ee98f80b46be3cef1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d77b6ff0ce35a6d0b0b7b9581bc3f76d041d4087",
          "url": "https://git.kernel.org/stable/c/d77b6ff0ce35a6d0b0b7b9581bc3f76d041d4087"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dce6c2aa70e94c04c523b375dfcc664d7a0a560a",
          "url": "https://git.kernel.org/stable/c/dce6c2aa70e94c04c523b375dfcc664d7a0a560a"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-19T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37817",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmcb: fix a double free bug in chameleon_parse_gdd()\n\nIn chameleon_parse_gdd(), if mcb_device_register() fails, 'mdev'\nwould be released in mcb_device_register() via put_device().\nThus, goto 'err' label and free 'mdev' again causes a double free.\nJust return if mcb_device_register() fails.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37817"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4ffe8c9fb561e4427dd1a3056cd5b3685b74f78d",
          "url": "https://git.kernel.org/stable/c/4ffe8c9fb561e4427dd1a3056cd5b3685b74f78d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/59f993cd36b6e28a394ba3d977e8ffe5c9884e3b",
          "url": "https://git.kernel.org/stable/c/59f993cd36b6e28a394ba3d977e8ffe5c9884e3b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7c7f1bfdb2249f854a736d9b79778c7e5a29a150",
          "url": "https://git.kernel.org/stable/c/7c7f1bfdb2249f854a736d9b79778c7e5a29a150"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/96838eb1836fd372e42be5db84f0b333b65146a6",
          "url": "https://git.kernel.org/stable/c/96838eb1836fd372e42be5db84f0b333b65146a6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bcc7d58ee5173e34306026bd01e1fbf75e169d37",
          "url": "https://git.kernel.org/stable/c/bcc7d58ee5173e34306026bd01e1fbf75e169d37"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c5b8a549ef1fcc6066b037a3962c79d60465ba0b",
          "url": "https://git.kernel.org/stable/c/c5b8a549ef1fcc6066b037a3962c79d60465ba0b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d70184958b0ea8c0fd52e2b456654b503e769fc8",
          "url": "https://git.kernel.org/stable/c/d70184958b0ea8c0fd52e2b456654b503e769fc8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/df1a5d5c6134224f9298e5189230f9d29ae50cac",
          "url": "https://git.kernel.org/stable/c/df1a5d5c6134224f9298e5189230f9d29ae50cac"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-08T07:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53559",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nip_vti: fix potential slab-use-after-free in decode_session6\n\nWhen ip_vti device is set to the qdisc of the sfb type, the cb field\nof the sent skb may be modified during enqueuing. Then,\nslab-use-after-free may occur when ip_vti device sends IPv6 packets.\nAs commit f855691975bb (\"xfrm6: Fix the nexthdr offset in\n_decode_session6.\") showed, xfrm_decode_session was originally intended\nonly for the receive path. IP6CB(skb)->nhoff is not set during\ntransmission. Therefore, set the cb field in the skb to 0 before\nsending packets.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53559"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0b4d69539fdea138af2befe08893850c89248068",
          "url": "https://git.kernel.org/stable/c/0b4d69539fdea138af2befe08893850c89248068"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2b05bf5dc437f7891dd409a3eaf5058459391c7a",
          "url": "https://git.kernel.org/stable/c/2b05bf5dc437f7891dd409a3eaf5058459391c7a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6018a266279b1a75143c7c0804dd08a5fc4c3e0b",
          "url": "https://git.kernel.org/stable/c/6018a266279b1a75143c7c0804dd08a5fc4c3e0b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/78e397a43e1c47321a4679cc49a6c4530bf820b9",
          "url": "https://git.kernel.org/stable/c/78e397a43e1c47321a4679cc49a6c4530bf820b9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7dfe23659f3677c08a60a0056cda2d91a79c15ca",
          "url": "https://git.kernel.org/stable/c/7dfe23659f3677c08a60a0056cda2d91a79c15ca"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/82fb41c5de243e7dfa90f32ca58e35adaff56c1d",
          "url": "https://git.kernel.org/stable/c/82fb41c5de243e7dfa90f32ca58e35adaff56c1d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d34c30442d5e53a33cde79ca163320dbe2432cbd",
          "url": "https://git.kernel.org/stable/c/d34c30442d5e53a33cde79ca163320dbe2432cbd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e1e04cc2ef2c0c0866c19f5627149a76c2baae32",
          "url": "https://git.kernel.org/stable/c/e1e04cc2ef2c0c0866c19f5627149a76c2baae32"
        }
      ],
      "release_date": "2025-10-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38697",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: upper bound check of tree index in dbAllocAG\n\nWhen computing the tree index in dbAllocAG, we never check if we are\nout of bounds realative to the size of the stree.\nThis could happen in a scenario where the filesystem metadata are\ncorrupted.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38697"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1467a75819e41341cd5ebd16faa2af1ca3c8f4fe",
          "url": "https://git.kernel.org/stable/c/1467a75819e41341cd5ebd16faa2af1ca3c8f4fe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/173cfd741ad7073640bfb7e2344c2a0ee005e769",
          "url": "https://git.kernel.org/stable/c/173cfd741ad7073640bfb7e2344c2a0ee005e769"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2dd05f09cc323018136a7ecdb3d1007be9ede27f",
          "url": "https://git.kernel.org/stable/c/2dd05f09cc323018136a7ecdb3d1007be9ede27f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/30e19a884c0b11f33821aacda7e72e914bec26ef",
          "url": "https://git.kernel.org/stable/c/30e19a884c0b11f33821aacda7e72e914bec26ef"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/49ea46d9025aa1914b24ea957636cbe4367a7311",
          "url": "https://git.kernel.org/stable/c/49ea46d9025aa1914b24ea957636cbe4367a7311"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5bdb9553fb134fd52ec208a8b378120670f6e784",
          "url": "https://git.kernel.org/stable/c/5bdb9553fb134fd52ec208a8b378120670f6e784"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a4f199203f79ca9cd7355799ccb26800174ff093",
          "url": "https://git.kernel.org/stable/c/a4f199203f79ca9cd7355799ccb26800174ff093"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c214006856ff52a8ff17ed8da52d50601d54f9ce",
          "url": "https://git.kernel.org/stable/c/c214006856ff52a8ff17ed8da52d50601d54f9ce"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c8ca21a2836993d7cb816668458e05e598574e55",
          "url": "https://git.kernel.org/stable/c/c8ca21a2836993d7cb816668458e05e598574e55"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38157",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k_htc: Abort software beacon handling if disabled\n\nA malicious USB device can send a WMI_SWBA_EVENTID event from an\nath9k_htc-managed device before beaconing has been enabled. This causes\na device-by-zero error in the driver, leading to either a crash or an\nout of bounds read.\n\nPrevent this by aborting the handling in ath9k_htc_swba() if beacons are\nnot enabled.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38157"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0281c19074976ec48f0078d50530b406ddae75bc",
          "url": "https://git.kernel.org/stable/c/0281c19074976ec48f0078d50530b406ddae75bc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/40471b23147c86ea3ed97faee79937c618250bd0",
          "url": "https://git.kernel.org/stable/c/40471b23147c86ea3ed97faee79937c618250bd0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5482ef9875eaa43f0435e14570e1193823de857e",
          "url": "https://git.kernel.org/stable/c/5482ef9875eaa43f0435e14570e1193823de857e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5a85c21f812e02cb00ca07007d88acdd42d08c46",
          "url": "https://git.kernel.org/stable/c/5a85c21f812e02cb00ca07007d88acdd42d08c46"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7ee3fb6258da8c890a51b514f60d7570dc703605",
          "url": "https://git.kernel.org/stable/c/7ee3fb6258da8c890a51b514f60d7570dc703605"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ac4e317a95a1092b5da5b9918b7118759342641c",
          "url": "https://git.kernel.org/stable/c/ac4e317a95a1092b5da5b9918b7118759342641c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e5ce9df1d68094d37360dbd9b09289d42fa21e54",
          "url": "https://git.kernel.org/stable/c/e5ce9df1d68094d37360dbd9b09289d42fa21e54"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ee5ee646385f5846dcbc881389f3c44a197c402a",
          "url": "https://git.kernel.org/stable/c/ee5ee646385f5846dcbc881389f3c44a197c402a"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-03T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37892",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: inftlcore: Add error check for inftl_read_oob()\n\nIn INFTL_findwriteunit(), the return value of inftl_read_oob()\nneed to be checked. A proper implementation can be\nfound in INFTL_deleteblock(). The status will be set as\nSECTOR_IGNORE to break from the while-loop correctly\nif the inftl_read_oob() fails.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37892"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0300e751170cf80c05ca1a762a7b449e8ca6b693",
          "url": "https://git.kernel.org/stable/c/0300e751170cf80c05ca1a762a7b449e8ca6b693"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/114d94f095aa405fa9a51484c4be34846d7bb386",
          "url": "https://git.kernel.org/stable/c/114d94f095aa405fa9a51484c4be34846d7bb386"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1c22356dfb041e5292835c9ff44d5f91bef8dd18",
          "url": "https://git.kernel.org/stable/c/1c22356dfb041e5292835c9ff44d5f91bef8dd18"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5479a6af3c96f73bec2d2819532b6d6814f52dd6",
          "url": "https://git.kernel.org/stable/c/5479a6af3c96f73bec2d2819532b6d6814f52dd6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6af3b92b1c0b58ca281d0e1501bad2567f73c1a5",
          "url": "https://git.kernel.org/stable/c/6af3b92b1c0b58ca281d0e1501bad2567f73c1a5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7772621041ee78823ccc5f1fe38f6faa22af7023",
          "url": "https://git.kernel.org/stable/c/7772621041ee78823ccc5f1fe38f6faa22af7023"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b828d394308e8e00df0a6f57e7dabae609bb8b7b",
          "url": "https://git.kernel.org/stable/c/b828d394308e8e00df0a6f57e7dabae609bb8b7b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d027951dc85cb2e15924c980dc22a6754d100c7c",
          "url": "https://git.kernel.org/stable/c/d027951dc85cb2e15924c980dc22a6754d100c7c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e7d6ceff95c55297f0ee8f9dbc4da5c558f30e9e",
          "url": "https://git.kernel.org/stable/c/e7d6ceff95c55297f0ee8f9dbc4da5c558f30e9e"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-20T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53604",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm integrity: call kmem_cache_destroy() in dm_integrity_init() error path\n\nOtherwise the journal_io_cache will leak if dm_register_target() fails.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53604"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3877b5c1509b16eeb1f275228fd91789cd88cf17",
          "url": "https://git.kernel.org/stable/c/3877b5c1509b16eeb1f275228fd91789cd88cf17"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/44f29e93a55b544dc961b6f8b4e93abaeaafb9ee",
          "url": "https://git.kernel.org/stable/c/44f29e93a55b544dc961b6f8b4e93abaeaafb9ee"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6b79a428c02769f2a11f8ae76bf866226d134887",
          "url": "https://git.kernel.org/stable/c/6b79a428c02769f2a11f8ae76bf866226d134887"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6d126899b0747305c9d39a0bcf87e0df9c3f555b",
          "url": "https://git.kernel.org/stable/c/6d126899b0747305c9d39a0bcf87e0df9c3f555b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a5d8c6bf58e5b2e70fbc15f3b08dfc1ba6f269ac",
          "url": "https://git.kernel.org/stable/c/a5d8c6bf58e5b2e70fbc15f3b08dfc1ba6f269ac"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c8c9c50268729bf35f6c9bb1205f490db920454e",
          "url": "https://git.kernel.org/stable/c/c8c9c50268729bf35f6c9bb1205f490db920454e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ca8b634fdf07dee3f6dfde57079c4511480b525e",
          "url": "https://git.kernel.org/stable/c/ca8b634fdf07dee3f6dfde57079c4511480b525e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e09a592fdd6c716506774bdbebb5f6c537b47767",
          "url": "https://git.kernel.org/stable/c/e09a592fdd6c716506774bdbebb5f6c537b47767"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ff4d6b5b38429a7731e5593680d2138bf74dd546",
          "url": "https://git.kernel.org/stable/c/ff4d6b5b38429a7731e5593680d2138bf74dd546"
        }
      ],
      "release_date": "2025-10-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38708",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrbd: add missing kref_get in handle_write_conflicts\n\nWith `two-primaries` enabled, DRBD tries to detect \"concurrent\" writes\nand handle write conflicts, so that even if you write to the same sector\nsimultaneously on both nodes, they end up with the identical data once\nthe writes are completed.\n\nIn handling \"superseeded\" writes, we forgot a kref_get,\nresulting in a premature drbd_destroy_device and use after free,\nand further to kernel crashes with symptoms.\n\nRelevance: No one should use DRBD as a random data generator, and apparently\nall users of \"two-primaries\" handle concurrent writes correctly on layer up.\nThat is cluster file systems use some distributed lock manager,\nand live migration in virtualization environments stops writes on one node\nbefore starting writes on the other node.\n\nWhich means that other than for \"test cases\",\nthis code path is never taken in real life.\n\nFYI, in DRBD 9, things are handled differently nowadays.  We still detect\n\"write conflicts\", but no longer try to be smart about them.\nWe decided to disconnect hard instead: upper layers must not submit concurrent\nwrites. If they do, that's their fault.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38708"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/00c9c9628b49e368d140cfa61d7df9b8922ec2a8",
          "url": "https://git.kernel.org/stable/c/00c9c9628b49e368d140cfa61d7df9b8922ec2a8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0336bfe9c237476bd7c45605a36ca79c2bca62e5",
          "url": "https://git.kernel.org/stable/c/0336bfe9c237476bd7c45605a36ca79c2bca62e5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3a896498f6f577e57bf26aaa93b48c22b6d20c20",
          "url": "https://git.kernel.org/stable/c/3a896498f6f577e57bf26aaa93b48c22b6d20c20"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/46e3763dcae0ffcf8fcfaff4fc10a90a92ffdd89",
          "url": "https://git.kernel.org/stable/c/46e3763dcae0ffcf8fcfaff4fc10a90a92ffdd89"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/57418de35420cedab035aa1da8a26c0499b7f575",
          "url": "https://git.kernel.org/stable/c/57418de35420cedab035aa1da8a26c0499b7f575"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7d483ad300fc0a06f69b019dda8f74970714baf8",
          "url": "https://git.kernel.org/stable/c/7d483ad300fc0a06f69b019dda8f74970714baf8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/810cd546a29bfac90ed1328ea01d693d4bd11cb1",
          "url": "https://git.kernel.org/stable/c/810cd546a29bfac90ed1328ea01d693d4bd11cb1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/84ef8dd3238330d1795745ece83b19f0295751bf",
          "url": "https://git.kernel.org/stable/c/84ef8dd3238330d1795745ece83b19f0295751bf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9f53b2433ad248cd3342cc345f56f5c7904bd8c4",
          "url": "https://git.kernel.org/stable/c/9f53b2433ad248cd3342cc345f56f5c7904bd8c4"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39824",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: asus: fix UAF via HID_CLAIMED_INPUT validation\n\nAfter hid_hw_start() is called hidinput_connect() will eventually be\ncalled to set up the device with the input layer since the\nHID_CONNECT_DEFAULT connect mask is used. During hidinput_connect()\nall input and output reports are processed and corresponding hid_inputs\nare allocated and configured via hidinput_configure_usages(). This\nprocess involves slot tagging report fields and configuring usages\nby setting relevant bits in the capability bitmaps. However it is possible\nthat the capability bitmaps are not set at all leading to the subsequent\nhidinput_has_been_populated() check to fail leading to the freeing of the\nhid_input and the underlying input device.\n\nThis becomes problematic because a malicious HID device like a\nASUS ROG N-Key keyboard can trigger the above scenario via a\nspecially crafted descriptor which then leads to a user-after-free\nwhen the name of the freed input device is written to later on after\nhid_hw_start(). Below, report 93 intentionally utilises the\nHID_UP_UNDEFINED Usage Page which is skipped during usage\nconfiguration, leading to the frees.\n\n0x05, 0x0D,        // Usage Page (Digitizer)\n0x09, 0x05,        // Usage (Touch Pad)\n0xA1, 0x01,        // Collection (Application)\n0x85, 0x0D,        //   Report ID (13)\n0x06, 0x00, 0xFF,  //   Usage Page (Vendor Defined 0xFF00)\n0x09, 0xC5,        //   Usage (0xC5)\n0x15, 0x00,        //   Logical Minimum (0)\n0x26, 0xFF, 0x00,  //   Logical Maximum (255)\n0x75, 0x08,        //   Report Size (8)\n0x95, 0x04,        //   Report Count (4)\n0xB1, 0x02,        //   Feature (Data,Var,Abs)\n0x85, 0x5D,        //   Report ID (93)\n0x06, 0x00, 0x00,  //   Usage Page (Undefined)\n0x09, 0x01,        //   Usage (0x01)\n0x15, 0x00,        //   Logical Minimum (0)\n0x26, 0xFF, 0x00,  //   Logical Maximum (255)\n0x75, 0x08,        //   Report Size (8)\n0x95, 0x1B,        //   Report Count (27)\n0x81, 0x02,        //   Input (Data,Var,Abs)\n0xC0,              // End Collection\n\nBelow is the KASAN splat after triggering the UAF:\n\n[   21.672709] ==================================================================\n[   21.673700] BUG: KASAN: slab-use-after-free in asus_probe+0xeeb/0xf80\n[   21.673700] Write of size 8 at addr ffff88810a0ac000 by task kworker/1:2/54\n[   21.673700]\n[   21.673700] CPU: 1 UID: 0 PID: 54 Comm: kworker/1:2 Not tainted 6.16.0-rc4-g9773391cf4dd-dirty #36 PREEMPT(voluntary)\n[   21.673700] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\n[   21.673700] Call Trace:\n[   21.673700]  <TASK>\n[   21.673700]  dump_stack_lvl+0x5f/0x80\n[   21.673700]  print_report+0xd1/0x660\n[   21.673700]  kasan_report+0xe5/0x120\n[   21.673700]  __asan_report_store8_noabort+0x1b/0x30\n[   21.673700]  asus_probe+0xeeb/0xf80\n[   21.673700]  hid_device_probe+0x2ee/0x700\n[   21.673700]  really_probe+0x1c6/0x6b0\n[   21.673700]  __driver_probe_device+0x24f/0x310\n[   21.673700]  driver_probe_device+0x4e/0x220\n[...]\n[   21.673700]\n[   21.673700] Allocated by task 54:\n[   21.673700]  kasan_save_stack+0x3d/0x60\n[   21.673700]  kasan_save_track+0x18/0x40\n[   21.673700]  kasan_save_alloc_info+0x3b/0x50\n[   21.673700]  __kasan_kmalloc+0x9c/0xa0\n[   21.673700]  __kmalloc_cache_noprof+0x139/0x340\n[   21.673700]  input_allocate_device+0x44/0x370\n[   21.673700]  hidinput_connect+0xcb6/0x2630\n[   21.673700]  hid_connect+0xf74/0x1d60\n[   21.673700]  hid_hw_start+0x8c/0x110\n[   21.673700]  asus_probe+0x5a3/0xf80\n[   21.673700]  hid_device_probe+0x2ee/0x700\n[   21.673700]  really_probe+0x1c6/0x6b0\n[   21.673700]  __driver_probe_device+0x24f/0x310\n[   21.673700]  driver_probe_device+0x4e/0x220\n[...]\n[   21.673700]\n[   21.673700] Freed by task 54:\n[   21.673700]  kasan_save_stack+0x3d/0x60\n[   21.673700]  kasan_save_track+0x18/0x40\n[   21.673700]  kasan_save_free_info+0x3f/0x60\n[   21.673700]  __kasan_slab_free+0x3c/0x50\n[   21.673700]  kfre\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39824"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5f3c0839b173f7f33415eb098331879e547d1d2d",
          "url": "https://git.kernel.org/stable/c/5f3c0839b173f7f33415eb098331879e547d1d2d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7170122e2ae4ab378c9cdf7cc54dea8b0abbbca5",
          "url": "https://git.kernel.org/stable/c/7170122e2ae4ab378c9cdf7cc54dea8b0abbbca5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/72a4ec018c9e9bc52f4f80eb3afb5d6a6b752275",
          "url": "https://git.kernel.org/stable/c/72a4ec018c9e9bc52f4f80eb3afb5d6a6b752275"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9a9e4a8317437bf944fa017c66e1e23a0368b5c7",
          "url": "https://git.kernel.org/stable/c/9a9e4a8317437bf944fa017c66e1e23a0368b5c7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a8ca8fe7f516d27ece3afb995c3bd4d07dcbe62c",
          "url": "https://git.kernel.org/stable/c/a8ca8fe7f516d27ece3afb995c3bd4d07dcbe62c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c0d77e3441a92d0b4958193c9ac1c3f81c6f1d1c",
          "url": "https://git.kernel.org/stable/c/c0d77e3441a92d0b4958193c9ac1c3f81c6f1d1c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d3af6ca9a8c34bbd8cff32b469b84c9021c9e7e4",
          "url": "https://git.kernel.org/stable/c/d3af6ca9a8c34bbd8cff32b469b84c9021c9e7e4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/eaae728e7335b5dbad70966e2bd520a731fdf7b2",
          "url": "https://git.kernel.org/stable/c/eaae728e7335b5dbad70966e2bd520a731fdf7b2"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-16T13:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39945",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncnic: Fix use-after-free bugs in cnic_delete_task\n\nThe original code uses cancel_delayed_work() in cnic_cm_stop_bnx2x_hw(),\nwhich does not guarantee that the delayed work item 'delete_task' has\nfully completed if it was already running. Additionally, the delayed work\nitem is cyclic, the flush_workqueue() in cnic_cm_stop_bnx2x_hw() only\nblocks and waits for work items that were already queued to the\nworkqueue prior to its invocation. Any work items submitted after\nflush_workqueue() is called are not included in the set of tasks that the\nflush operation awaits. This means that after the cyclic work items have\nfinished executing, a delayed work item may still exist in the workqueue.\nThis leads to use-after-free scenarios where the cnic_dev is deallocated\nby cnic_free_dev(), while delete_task remains active and attempt to\ndereference cnic_dev in cnic_delete_task().\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup)              | CPU 1 (delayed work callback)\ncnic_netdev_event()          |\n  cnic_stop_hw()             | cnic_delete_task()\n    cnic_cm_stop_bnx2x_hw()  | ...\n      cancel_delayed_work()  | /* the queue_delayed_work()\n      flush_workqueue()      |    executes after flush_workqueue()*/\n                             | queue_delayed_work()\n  cnic_free_dev(dev)//free   | cnic_delete_task() //new instance\n                             |   dev = cp->dev; //use\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the cyclic delayed work item is properly canceled and that any\nongoing execution of the work item completes before the cnic_dev is\ndeallocated. Furthermore, since cancel_delayed_work_sync() uses\n__flush_work(work, true) to synchronously wait for any currently\nexecuting instance of the work item to finish, the flush_workqueue()\nbecomes redundant and should be removed.\n\nThis bug was identified through static analysis. To reproduce the issue\nand validate the fix, I simulated the cnic PCI device in QEMU and\nintroduced intentional delays — such as inserting calls to ssleep()\nwithin the cnic_delete_task() function — to increase the likelihood\nof triggering the bug.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39945"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0405055930264ea8fd26f4131466fa7652e5e47d",
          "url": "https://git.kernel.org/stable/c/0405055930264ea8fd26f4131466fa7652e5e47d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0627e1481676669cae2df0d85b5ff13e7d24c390",
          "url": "https://git.kernel.org/stable/c/0627e1481676669cae2df0d85b5ff13e7d24c390"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6e33a7eed587062ca8161ad1f4584882a860d697",
          "url": "https://git.kernel.org/stable/c/6e33a7eed587062ca8161ad1f4584882a860d697"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7b6a5b0a6b392263c3767fc945b311ea04b34bbd",
          "url": "https://git.kernel.org/stable/c/7b6a5b0a6b392263c3767fc945b311ea04b34bbd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8eeb2091e72d75df8ceaa2172638d61b4cf8929a",
          "url": "https://git.kernel.org/stable/c/8eeb2091e72d75df8ceaa2172638d61b4cf8929a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cfa7d9b1e3a8604afc84e9e51d789c29574fb216",
          "url": "https://git.kernel.org/stable/c/cfa7d9b1e3a8604afc84e9e51d789c29574fb216"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e1fcd4a9c09feac0902a65615e866dbf22616125",
          "url": "https://git.kernel.org/stable/c/e1fcd4a9c09feac0902a65615e866dbf22616125"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fde6e73189f40ebcf0633aed2b68e731c25f3aa3",
          "url": "https://git.kernel.org/stable/c/fde6e73189f40ebcf0633aed2b68e731c25f3aa3"
        }
      ],
      "release_date": "2025-10-04T08:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53608",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix potential UAF of struct nilfs_sc_info in nilfs_segctor_thread()\n\nThe finalization of nilfs_segctor_thread() can race with\nnilfs_segctor_kill_thread() which terminates that thread, potentially\ncausing a use-after-free BUG as KASAN detected.\n\nAt the end of nilfs_segctor_thread(), it assigns NULL to \"sc_task\" member\nof \"struct nilfs_sc_info\" to indicate the thread has finished, and then\nnotifies nilfs_segctor_kill_thread() of this using waitqueue\n\"sc_wait_task\" on the struct nilfs_sc_info.\n\nHowever, here, immediately after the NULL assignment to \"sc_task\", it is\npossible that nilfs_segctor_kill_thread() will detect it and return to\ncontinue the deallocation, freeing the nilfs_sc_info structure before the\nthread does the notification.\n\nThis fixes the issue by protecting the NULL assignment to \"sc_task\" and\nits notification, with spinlock \"sc_state_lock\" of the struct\nnilfs_sc_info.  Since nilfs_segctor_kill_thread() does a final check to\nsee if \"sc_task\" is NULL with \"sc_state_lock\" locked, this can eliminate\nthe race.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53608"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/034cce77d52ba013ce62b4f5258c29907eb1ada5",
          "url": "https://git.kernel.org/stable/c/034cce77d52ba013ce62b4f5258c29907eb1ada5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0dbf0e64b91ee8fcb278aea93eb06fc7d56ecbcc",
          "url": "https://git.kernel.org/stable/c/0dbf0e64b91ee8fcb278aea93eb06fc7d56ecbcc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/613bf23c070d11c525268f2945aa594704a9b764",
          "url": "https://git.kernel.org/stable/c/613bf23c070d11c525268f2945aa594704a9b764"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6be49d100c22ffea3287a4b19d7639d259888e33",
          "url": "https://git.kernel.org/stable/c/6be49d100c22ffea3287a4b19d7639d259888e33"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/92684e02654c91a61a0b0561433b710bcece19fe",
          "url": "https://git.kernel.org/stable/c/92684e02654c91a61a0b0561433b710bcece19fe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b4d80bd6370b81a1725b6b8f7894802c23a14e9f",
          "url": "https://git.kernel.org/stable/c/b4d80bd6370b81a1725b6b8f7894802c23a14e9f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bae009a2f1b7c2011d2e92d8c84868d315c0b97e",
          "url": "https://git.kernel.org/stable/c/bae009a2f1b7c2011d2e92d8c84868d315c0b97e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f32297dba338dc06d62286dedb3cdbd5175b1719",
          "url": "https://git.kernel.org/stable/c/f32297dba338dc06d62286dedb3cdbd5175b1719"
        }
      ],
      "release_date": "2025-10-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38574",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npptp: ensure minimal skb length in pptp_xmit()\n\nCommit aabc6596ffb3 (\"net: ppp: Add bound checking for skb data\non ppp_sync_txmung\") fixed ppp_sync_txmunge()\n\nWe need a similar fix in pptp_xmit(), otherwise we might\nread uninit data as reported by syzbot.\n\nBUG: KMSAN: uninit-value in pptp_xmit+0xc34/0x2720 drivers/net/ppp/pptp.c:193\n  pptp_xmit+0xc34/0x2720 drivers/net/ppp/pptp.c:193\n  ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2290 [inline]\n  ppp_input+0x1d6/0xe60 drivers/net/ppp/ppp_generic.c:2314\n  pppoe_rcv_core+0x1e8/0x760 drivers/net/ppp/pppoe.c:379\n  sk_backlog_rcv+0x142/0x420 include/net/sock.h:1148\n  __release_sock+0x1d3/0x330 net/core/sock.c:3213\n  release_sock+0x6b/0x270 net/core/sock.c:3767\n  pppoe_sendmsg+0x15d/0xcb0 drivers/net/ppp/pppoe.c:904\n  sock_sendmsg_nosec net/socket.c:712 [inline]\n  __sock_sendmsg+0x330/0x3d0 net/socket.c:727\n  ____sys_sendmsg+0x893/0xd80 net/socket.c:2566\n  ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620\n  __sys_sendmmsg+0x2d9/0x7c0 net/socket.c:2709",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38574"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1a04db0fd75cb6034fc27a56b67b3b8b9022a98c",
          "url": "https://git.kernel.org/stable/c/1a04db0fd75cb6034fc27a56b67b3b8b9022a98c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/26672f1679b143aa34fca0b6046b7fd0c184770d",
          "url": "https://git.kernel.org/stable/c/26672f1679b143aa34fca0b6046b7fd0c184770d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5005d24377378a20e5c0e53052fc4ebdcdcbc611",
          "url": "https://git.kernel.org/stable/c/5005d24377378a20e5c0e53052fc4ebdcdcbc611"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/504cc4ab91073d2ac7404ad146139f86ecee7193",
          "url": "https://git.kernel.org/stable/c/504cc4ab91073d2ac7404ad146139f86ecee7193"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5de7513f38f3c19c0610294ee478242bea356f8c",
          "url": "https://git.kernel.org/stable/c/5de7513f38f3c19c0610294ee478242bea356f8c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/97b8c5d322c5c0038cac4bc56fdbe237d0be426f",
          "url": "https://git.kernel.org/stable/c/97b8c5d322c5c0038cac4bc56fdbe237d0be426f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b7dcda76fd0615c0599c89f36873a6cd48e02dbb",
          "url": "https://git.kernel.org/stable/c/b7dcda76fd0615c0599c89f36873a6cd48e02dbb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/de9c4861fb42f0cd72da844c3c34f692d5895b7b",
          "url": "https://git.kernel.org/stable/c/de9c4861fb42f0cd72da844c3c34f692d5895b7b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ea99b88b1999ebcb24d5d3a6b7910030f40d3bba",
          "url": "https://git.kernel.org/stable/c/ea99b88b1999ebcb24d5d3a6b7910030f40d3bba"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-08-19T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38459",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: clip: Fix infinite recursive call of clip_push().\n\nsyzbot reported the splat below. [0]\n\nThis happens if we call ioctl(ATMARP_MKIP) more than once.\n\nDuring the first call, clip_mkip() sets clip_push() to vcc->push(),\nand the second call copies it to clip_vcc->old_push().\n\nLater, when the socket is close()d, vcc_destroy_socket() passes\nNULL skb to clip_push(), which calls clip_vcc->old_push(),\ntriggering the infinite recursion.\n\nLet's prevent the second ioctl(ATMARP_MKIP) by checking\nvcc->user_back, which is allocated by the first call as clip_vcc.\n\nNote also that we use lock_sock() to prevent racy calls.\n\n[0]:\nBUG: TASK stack guard page was hit at ffffc9000d66fff8 (stack is ffffc9000d670000..ffffc9000d678000)\nOops: stack guard page: 0000 [#1] SMP KASAN NOPTI\nCPU: 0 UID: 0 PID: 5322 Comm: syz.0.0 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT(full)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\nRIP: 0010:clip_push+0x5/0x720 net/atm/clip.c:191\nCode: e0 8f aa 8c e8 1c ad 5b fa eb ae 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 55 <41> 57 41 56 41 55 41 54 53 48 83 ec 20 48 89 f3 49 89 fd 48 bd 00\nRSP: 0018:ffffc9000d670000 EFLAGS: 00010246\nRAX: 1ffff1100235a4a5 RBX: ffff888011ad2508 RCX: ffff8880003c0000\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888037f01000\nRBP: dffffc0000000000 R08: ffffffff8fa104f7 R09: 1ffffffff1f4209e\nR10: dffffc0000000000 R11: ffffffff8a99b300 R12: ffffffff8a99b300\nR13: ffff888037f01000 R14: ffff888011ad2500 R15: ffff888037f01578\nFS:  000055557ab6d500(0000) GS:ffff88808d250000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffc9000d66fff8 CR3: 0000000043172000 CR4: 0000000000352ef0\nCall Trace:\n <TASK>\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n...\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n vcc_destroy_socket net/atm/common.c:183 [inline]\n vcc_release+0x157/0x460 net/atm/common.c:205\n __sock_release net/socket.c:647 [inline]\n sock_close+0xc0/0x240 net/socket.c:1391\n __fput+0x449/0xa70 fs/file_table.c:465\n task_work_run+0x1d1/0x260 kernel/task_work.c:227\n resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]\n exit_to_user_mode_loop+0xec/0x110 kernel/entry/common.c:114\n exit_to_user_mode_prepare include/linux/entry-common.h:330 [inline]\n syscall_exit_to_user_mode_work include/linux/entry-common.h:414 [inline]\n syscall_exit_to_user_mode include/linux/entry-common.h:449 [inline]\n do_syscall_64+0x2bd/0x3b0 arch/x86/entry/syscall_64.c:100\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7ff31c98e929\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fffb5aa1f78 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4\nRAX: 0000000000000000 RBX: 0000000000012747 RCX: 00007ff31c98e929\nRDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003\nRBP: 00007ff31cbb7ba0 R08: 0000000000000001 R09: 0000000db5aa226f\nR10: 00007ff31c7ff030 R11: 0000000000000246 R12: 00007ff31cbb608c\nR13: 00007ff31cbb6080 R14: ffffffffffffffff R15: 00007fffb5aa2090\n </TASK>\nModules linked in:",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38459"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/024876b247a882972095b22087734dcd23396a4e",
          "url": "https://git.kernel.org/stable/c/024876b247a882972095b22087734dcd23396a4e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/125166347d5676466d368aadc0bbc31ee7714352",
          "url": "https://git.kernel.org/stable/c/125166347d5676466d368aadc0bbc31ee7714352"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1579a2777cb914a249de22c789ba4d41b154509f",
          "url": "https://git.kernel.org/stable/c/1579a2777cb914a249de22c789ba4d41b154509f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3f61b997fe014bbfcc208a9fcbd363a1fe7e3a31",
          "url": "https://git.kernel.org/stable/c/3f61b997fe014bbfcc208a9fcbd363a1fe7e3a31"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5641019dfbaee5e85fe093b590f0451c9dd4d6f8",
          "url": "https://git.kernel.org/stable/c/5641019dfbaee5e85fe093b590f0451c9dd4d6f8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c489f3283dbfc0f3c00c312149cae90d27552c45",
          "url": "https://git.kernel.org/stable/c/c489f3283dbfc0f3c00c312149cae90d27552c45"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/df0312d8859763aa15b8b56ac151a1ea4a4e5b88",
          "url": "https://git.kernel.org/stable/c/df0312d8859763aa15b8b56ac151a1ea4a4e5b88"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f493f31a63847624fd3199ac836a8bd8828e50e2",
          "url": "https://git.kernel.org/stable/c/f493f31a63847624fd3199ac836a8bd8828e50e2"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-25T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37923",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix oob write in trace_seq_to_buffer()\n\nsyzbot reported this bug:\n==================================================================\nBUG: KASAN: slab-out-of-bounds in trace_seq_to_buffer kernel/trace/trace.c:1830 [inline]\nBUG: KASAN: slab-out-of-bounds in tracing_splice_read_pipe+0x6be/0xdd0 kernel/trace/trace.c:6822\nWrite of size 4507 at addr ffff888032b6b000 by task syz.2.320/7260\n\nCPU: 1 UID: 0 PID: 7260 Comm: syz.2.320 Not tainted 6.15.0-rc1-syzkaller-00301-g3bde70a2c827 #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:408 [inline]\n print_report+0xc3/0x670 mm/kasan/report.c:521\n kasan_report+0xe0/0x110 mm/kasan/report.c:634\n check_region_inline mm/kasan/generic.c:183 [inline]\n kasan_check_range+0xef/0x1a0 mm/kasan/generic.c:189\n __asan_memcpy+0x3c/0x60 mm/kasan/shadow.c:106\n trace_seq_to_buffer kernel/trace/trace.c:1830 [inline]\n tracing_splice_read_pipe+0x6be/0xdd0 kernel/trace/trace.c:6822\n ....\n==================================================================\n\nIt has been reported that trace_seq_to_buffer() tries to copy more data\nthan PAGE_SIZE to buf. Therefore, to prevent this, we should use the\nsmaller of trace_seq_used(&iter->seq) and PAGE_SIZE as an argument.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37923"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/056ebbddb8faf4ddf83d005454dd78fc25c2d897",
          "url": "https://git.kernel.org/stable/c/056ebbddb8faf4ddf83d005454dd78fc25c2d897"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1a3f9482b50b74fa9421bff8ceecfefd0dc06f8f",
          "url": "https://git.kernel.org/stable/c/1a3f9482b50b74fa9421bff8ceecfefd0dc06f8f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1f27a3e93b8d674b24b27fcdbc6f72743cd96c0d",
          "url": "https://git.kernel.org/stable/c/1f27a3e93b8d674b24b27fcdbc6f72743cd96c0d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/441021e5b3c7d9bd1b963590652c415929f3b157",
          "url": "https://git.kernel.org/stable/c/441021e5b3c7d9bd1b963590652c415929f3b157"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/665ce421041890571852422487f4c613d1824ba9",
          "url": "https://git.kernel.org/stable/c/665ce421041890571852422487f4c613d1824ba9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c5d2b66c5ef5037b4b4360e5447605ff00ba1bd4",
          "url": "https://git.kernel.org/stable/c/c5d2b66c5ef5037b4b4360e5447605ff00ba1bd4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f4b0174e9f18aaba59ee6ffdaf8827a7f94eb606",
          "url": "https://git.kernel.org/stable/c/f4b0174e9f18aaba59ee6ffdaf8827a7f94eb606"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f5178c41bb43444a6008150fe6094497135d07cb",
          "url": "https://git.kernel.org/stable/c/f5178c41bb43444a6008150fe6094497135d07cb"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        }
      ],
      "release_date": "2025-05-20T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38724",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()\n\nLei Lu recently reported that nfsd4_setclientid_confirm() did not check\nthe return value from get_client_locked(). a SETCLIENTID_CONFIRM could\nrace with a confirmed client expiring and fail to get a reference. That\ncould later lead to a UAF.\n\nFix this by getting a reference early in the case where there is an\nextant confirmed client. If that fails then treat it as if there were no\nconfirmed client found at all.\n\nIn the case where the unconfirmed client is expiring, just fail and\nreturn the result from get_client_locked().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38724"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/22f45cedf281e6171817c8a3432c44d788c550e1",
          "url": "https://git.kernel.org/stable/c/22f45cedf281e6171817c8a3432c44d788c550e1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/36e83eda90e0e4ac52f259f775b40b2841f8a0a3",
          "url": "https://git.kernel.org/stable/c/36e83eda90e0e4ac52f259f775b40b2841f8a0a3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3f252a73e81aa01660cb426735eab932e6182e8d",
          "url": "https://git.kernel.org/stable/c/3f252a73e81aa01660cb426735eab932e6182e8d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/571a5e46c71490285d2d8c06f6b5a7cbf6c7edd1",
          "url": "https://git.kernel.org/stable/c/571a5e46c71490285d2d8c06f6b5a7cbf6c7edd1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/74ad36ed60df561a303a19ecef400c7096b20306",
          "url": "https://git.kernel.org/stable/c/74ad36ed60df561a303a19ecef400c7096b20306"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/908e4ead7f757504d8b345452730636e298cbf68",
          "url": "https://git.kernel.org/stable/c/908e4ead7f757504d8b345452730636e298cbf68"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d35ac850410966010e92f401f4e21868a9ea4d8b",
          "url": "https://git.kernel.org/stable/c/d35ac850410966010e92f401f4e21868a9ea4d8b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d71abd1ae4e0413707cd42b10c24a11d1aa71772",
          "url": "https://git.kernel.org/stable/c/d71abd1ae4e0413707cd42b10c24a11d1aa71772"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f3aac6cf390d8b80e1d82975faf4ac61175519c0",
          "url": "https://git.kernel.org/stable/c/f3aac6cf390d8b80e1d82975faf4ac61175519c0"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38494",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: core: do not bypass hid_hw_raw_request\n\nhid_hw_raw_request() is actually useful to ensure the provided buffer\nand length are valid. Directly calling in the low level transport driver\nfunction bypassed those checks and allowed invalid paramto be used.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38494"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0e5017d84d650ca0eeaf4a3fe9264c5dbc886b81",
          "url": "https://git.kernel.org/stable/c/0e5017d84d650ca0eeaf4a3fe9264c5dbc886b81"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/19d1314d46c0d8a5c08ab53ddeb62280c77698c0",
          "url": "https://git.kernel.org/stable/c/19d1314d46c0d8a5c08ab53ddeb62280c77698c0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/40e25aa7e4e0f2440c73a683ee448e41c7c344ed",
          "url": "https://git.kernel.org/stable/c/40e25aa7e4e0f2440c73a683ee448e41c7c344ed"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a62a895edb2bfebffa865b5129a66e3b4287f34f",
          "url": "https://git.kernel.org/stable/c/a62a895edb2bfebffa865b5129a66e3b4287f34f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c2ca42f190b6714d6c481dfd3d9b62ea091c946b",
          "url": "https://git.kernel.org/stable/c/c2ca42f190b6714d6c481dfd3d9b62ea091c946b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d18f63e848840100dbc351a82e7042eac5a28cf5",
          "url": "https://git.kernel.org/stable/c/d18f63e848840100dbc351a82e7042eac5a28cf5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dd8e8314f2ce225dade5248dcfb9e2ac0edda624",
          "url": "https://git.kernel.org/stable/c/dd8e8314f2ce225dade5248dcfb9e2ac0edda624"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f10923b8d32a473b229477b63f23bbd72b1e9910",
          "url": "https://git.kernel.org/stable/c/f10923b8d32a473b229477b63f23bbd72b1e9910"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-28T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50030",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input\n\nMalformed user input to debugfs results in buffer overflow crashes.  Adapt\ninput string lengths to fit within internal buffers, leaving space for NULL\nterminators.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50030"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2d544e9d19c109dfe34b3dc1253a8b2971abe060",
          "url": "https://git.kernel.org/stable/c/2d544e9d19c109dfe34b3dc1253a8b2971abe060"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/927907f1cbb3408cadde637fccfc17bb6b10a87d",
          "url": "https://git.kernel.org/stable/c/927907f1cbb3408cadde637fccfc17bb6b10a87d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b92506dc51f81741eb26609175ac206c20f06e0a",
          "url": "https://git.kernel.org/stable/c/b92506dc51f81741eb26609175ac206c20f06e0a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c29a4baaad38a332c0ae480cf6d6c5bf75ac1828",
          "url": "https://git.kernel.org/stable/c/c29a4baaad38a332c0ae480cf6d6c5bf75ac1828"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f8191d40aa612981ce897e66cda6a88db8df17bb",
          "url": "https://git.kernel.org/stable/c/f8191d40aa612981ce897e66cda6a88db8df17bb"
        }
      ],
      "release_date": "2025-06-18T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53554",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext()\n\nThe \"exc->key_len\" is a u16 that comes from the user.  If it's over\nIW_ENCODING_TOKEN_MAX (64) that could lead to memory corruption.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53554"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5373a1aa91b2298f9305794b8270cf9896be96b6",
          "url": "https://git.kernel.org/stable/c/5373a1aa91b2298f9305794b8270cf9896be96b6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5f1c7031e044cb2fba82836d55cc235e2ad619dc",
          "url": "https://git.kernel.org/stable/c/5f1c7031e044cb2fba82836d55cc235e2ad619dc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/663fff29fd613e2b0d30c4138157312ba93c4939",
          "url": "https://git.kernel.org/stable/c/663fff29fd613e2b0d30c4138157312ba93c4939"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7ae9f55a495077f838bab466411ee6f38574df9b",
          "url": "https://git.kernel.org/stable/c/7ae9f55a495077f838bab466411ee6f38574df9b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9496fb96ddeb740dc6b966f4a7d8dfb8b93921c6",
          "url": "https://git.kernel.org/stable/c/9496fb96ddeb740dc6b966f4a7d8dfb8b93921c6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b1b04b56745bc79286c80aa876fabfab1e08ebf1",
          "url": "https://git.kernel.org/stable/c/b1b04b56745bc79286c80aa876fabfab1e08ebf1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/baf420e30364ef9efe3e29a5c0e01e612aebf3fe",
          "url": "https://git.kernel.org/stable/c/baf420e30364ef9efe3e29a5c0e01e612aebf3fe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/caac4b6c15b66feae4d83f602e1e46f124540202",
          "url": "https://git.kernel.org/stable/c/caac4b6c15b66feae4d83f602e1e46f124540202"
        }
      ],
      "release_date": "2025-10-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39863",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work\n\nThe brcmf_btcoex_detach() only shuts down the btcoex timer, if the\nflag timer_on is false. However, the brcmf_btcoex_timerfunc(), which\nruns as timer handler, sets timer_on to false. This creates critical\nrace conditions:\n\n1.If brcmf_btcoex_detach() is called while brcmf_btcoex_timerfunc()\nis executing, it may observe timer_on as false and skip the call to\ntimer_shutdown_sync().\n\n2.The brcmf_btcoex_timerfunc() may then reschedule the brcmf_btcoex_info\nworker after the cancel_work_sync() has been executed, resulting in\nuse-after-free bugs.\n\nThe use-after-free bugs occur in two distinct scenarios, depending on\nthe timing of when the brcmf_btcoex_info struct is freed relative to\nthe execution of its worker thread.\n\nScenario 1: Freed before the worker is scheduled\n\nThe brcmf_btcoex_info is deallocated before the worker is scheduled.\nA race condition can occur when schedule_work(&bt_local->work) is\ncalled after the target memory has been freed. The sequence of events\nis detailed below:\n\nCPU0                           | CPU1\nbrcmf_btcoex_detach            | brcmf_btcoex_timerfunc\n                               |   bt_local->timer_on = false;\n  if (cfg->btcoex->timer_on)   |\n    ...                        |\n  cancel_work_sync();          |\n  ...                          |\n  kfree(cfg->btcoex); // FREE  |\n                               |   schedule_work(&bt_local->work); // USE\n\nScenario 2: Freed after the worker is scheduled\n\nThe brcmf_btcoex_info is freed after the worker has been scheduled\nbut before or during its execution. In this case, statements within\nthe brcmf_btcoex_handler() — such as the container_of macro and\nsubsequent dereferences of the brcmf_btcoex_info object will cause\na use-after-free access. The following timeline illustrates this\nscenario:\n\nCPU0                            | CPU1\nbrcmf_btcoex_detach             | brcmf_btcoex_timerfunc\n                                |   bt_local->timer_on = false;\n  if (cfg->btcoex->timer_on)    |\n    ...                         |\n  cancel_work_sync();           |\n  ...                           |   schedule_work(); // Reschedule\n                                |\n  kfree(cfg->btcoex); // FREE   |   brcmf_btcoex_handler() // Worker\n  /*                            |     btci = container_of(....); // USE\n   The kfree() above could      |     ...\n   also occur at any point      |     btci-> // USE\n   during the worker's execution|\n   */                           |\n\nTo resolve the race conditions, drop the conditional check and call\ntimer_shutdown_sync() directly. It can deactivate the timer reliably,\nregardless of its current state. Once stopped, the timer_on state is\nthen set to false.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39863"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2f6fbc8e04ca1d1d5c560be694199f847229c625",
          "url": "https://git.kernel.org/stable/c/2f6fbc8e04ca1d1d5c560be694199f847229c625"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3e789f8475f6c857c88de5c5bf4b24b11a477dd7",
          "url": "https://git.kernel.org/stable/c/3e789f8475f6c857c88de5c5bf4b24b11a477dd7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9cb83d4be0b9b697eae93d321e0da999f9cdfcfc",
          "url": "https://git.kernel.org/stable/c/9cb83d4be0b9b697eae93d321e0da999f9cdfcfc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f1150153c4e5940fe49ab51136343c5b4fe49d63",
          "url": "https://git.kernel.org/stable/c/f1150153c4e5940fe49ab51136343c5b4fe49d63"
        }
      ],
      "release_date": "2025-09-19T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38403",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/vmci: Clear the vmci transport packet properly when initializing it\n\nIn vmci_transport_packet_init memset the vmci_transport_packet before\npopulating the fields to avoid any uninitialised data being left in the\nstructure.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38403"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0a01021317375b8d1895152f544421ce49299eb1",
          "url": "https://git.kernel.org/stable/c/0a01021317375b8d1895152f544421ce49299eb1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/19c2cc01ff9a8031398a802676ffb0f4692dd95d",
          "url": "https://git.kernel.org/stable/c/19c2cc01ff9a8031398a802676ffb0f4692dd95d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1c1bcb0e78230f533b4103e8cf271d17c3f469f0",
          "url": "https://git.kernel.org/stable/c/1c1bcb0e78230f533b4103e8cf271d17c3f469f0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/223e2288f4b8c262a864e2c03964ffac91744cd5",
          "url": "https://git.kernel.org/stable/c/223e2288f4b8c262a864e2c03964ffac91744cd5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2d44723a091bc853272e1a51a488a3d22b80be5e",
          "url": "https://git.kernel.org/stable/c/2d44723a091bc853272e1a51a488a3d22b80be5e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/75705b44e0b9aaa74f4c163d93d388bcba9e386a",
          "url": "https://git.kernel.org/stable/c/75705b44e0b9aaa74f4c163d93d388bcba9e386a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/94d0c326cb3ee6b0f8bd00e209550b93fcc5c839",
          "url": "https://git.kernel.org/stable/c/94d0c326cb3ee6b0f8bd00e209550b93fcc5c839"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e9a673153d578fd439919a24e99851b2f87ecbce",
          "url": "https://git.kernel.org/stable/c/e9a673153d578fd439919a24e99851b2f87ecbce"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-25T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38699",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: bfa: Double-free fix\n\nWhen the bfad_im_probe() function fails during initialization, the memory\npointed to by bfad->im is freed without setting bfad->im to NULL.\n\nSubsequently, during driver uninstallation, when the state machine enters\nthe bfad_sm_stopping state and calls the bfad_im_probe_undo() function,\nit attempts to free the memory pointed to by bfad->im again, thereby\ntriggering a double-free vulnerability.\n\nSet bfad->im to NULL if probing fails.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38699"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/13f613228cf3c96a038424cd97aa4d6aadc66294",
          "url": "https://git.kernel.org/stable/c/13f613228cf3c96a038424cd97aa4d6aadc66294"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/39cfe2c83146aad956318f866d0ee471b7a61fa5",
          "url": "https://git.kernel.org/stable/c/39cfe2c83146aad956318f866d0ee471b7a61fa5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/50d9bd48321038bd6e15af5a454bbcd180cf6f80",
          "url": "https://git.kernel.org/stable/c/50d9bd48321038bd6e15af5a454bbcd180cf6f80"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/684c92bb08a25ed3c0356bc7eb532ed5b19588dd",
          "url": "https://git.kernel.org/stable/c/684c92bb08a25ed3c0356bc7eb532ed5b19588dd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8456f862cb95bcc3a831e1ba87c0c17068be0f3f",
          "url": "https://git.kernel.org/stable/c/8456f862cb95bcc3a831e1ba87c0c17068be0f3f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8e03dd9fadf76db5b9799583074a1a2a54f787f1",
          "url": "https://git.kernel.org/stable/c/8e03dd9fadf76db5b9799583074a1a2a54f787f1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9337c2affbaebe00b75fdf84ea0e2fcf93c140af",
          "url": "https://git.kernel.org/stable/c/9337c2affbaebe00b75fdf84ea0e2fcf93c140af"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/add4c4850363d7c1b72e8fce9ccb21fdd2cf5dc9",
          "url": "https://git.kernel.org/stable/c/add4c4850363d7c1b72e8fce9ccb21fdd2cf5dc9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ba024d92564580bb90ec367248ace8efe16ce815",
          "url": "https://git.kernel.org/stable/c/ba024d92564580bb90ec367248ace8efe16ce815"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53616",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: fix invalid free of JFS_IP(ipimap)->i_imap in diUnmount\n\nsyzbot found an invalid-free in diUnmount:\n\nBUG: KASAN: double-free in slab_free mm/slub.c:3661 [inline]\nBUG: KASAN: double-free in __kmem_cache_free+0x71/0x110 mm/slub.c:3674\nFree of addr ffff88806f410000 by task syz-executor131/3632\n\n CPU: 0 PID: 3632 Comm: syz-executor131 Not tainted 6.1.0-rc7-syzkaller-00012-gca57f02295f1 #0\n Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022\n Call Trace:\n  <TASK>\n  __dump_stack lib/dump_stack.c:88 [inline]\n  dump_stack_lvl+0x1b1/0x28e lib/dump_stack.c:106\n  print_address_description+0x74/0x340 mm/kasan/report.c:284\n  print_report+0x107/0x1f0 mm/kasan/report.c:395\n  kasan_report_invalid_free+0xac/0xd0 mm/kasan/report.c:460\n  ____kasan_slab_free+0xfb/0x120\n  kasan_slab_free include/linux/kasan.h:177 [inline]\n  slab_free_hook mm/slub.c:1724 [inline]\n  slab_free_freelist_hook+0x12e/0x1a0 mm/slub.c:1750\n  slab_free mm/slub.c:3661 [inline]\n  __kmem_cache_free+0x71/0x110 mm/slub.c:3674\n  diUnmount+0xef/0x100 fs/jfs/jfs_imap.c:195\n  jfs_umount+0x108/0x370 fs/jfs/jfs_umount.c:63\n  jfs_put_super+0x86/0x190 fs/jfs/super.c:194\n  generic_shutdown_super+0x130/0x310 fs/super.c:492\n  kill_block_super+0x79/0xd0 fs/super.c:1428\n  deactivate_locked_super+0xa7/0xf0 fs/super.c:332\n  cleanup_mnt+0x494/0x520 fs/namespace.c:1186\n  task_work_run+0x243/0x300 kernel/task_work.c:179\n  exit_task_work include/linux/task_work.h:38 [inline]\n  do_exit+0x664/0x2070 kernel/exit.c:820\n  do_group_exit+0x1fd/0x2b0 kernel/exit.c:950\n  __do_sys_exit_group kernel/exit.c:961 [inline]\n  __se_sys_exit_group kernel/exit.c:959 [inline]\n  __x64_sys_exit_group+0x3b/0x40 kernel/exit.c:959\n  do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n  do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80\n  entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[...]\n\nJFS_IP(ipimap)->i_imap is not setting to NULL after free in diUnmount.\nIf jfs_remount() free JFS_IP(ipimap)->i_imap but then failed at diMount().\nJFS_IP(ipimap)->i_imap will be freed once again.\nFix this problem by setting JFS_IP(ipimap)->i_imap to NULL after free.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53616"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/114ea3cb13ab25f7178cb60283adb93d2f96dad7",
          "url": "https://git.kernel.org/stable/c/114ea3cb13ab25f7178cb60283adb93d2f96dad7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4de3a603010e0ca334487de24c6aab0777b7f808",
          "url": "https://git.kernel.org/stable/c/4de3a603010e0ca334487de24c6aab0777b7f808"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5873df0195124be2f357de11bfd473ead4f90ed8",
          "url": "https://git.kernel.org/stable/c/5873df0195124be2f357de11bfd473ead4f90ed8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6e2bda2c192d0244b5a78b787ef20aa10cb319b7",
          "url": "https://git.kernel.org/stable/c/6e2bda2c192d0244b5a78b787ef20aa10cb319b7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/756747d4b439e3e1159282ae89f17eefebbe9b25",
          "url": "https://git.kernel.org/stable/c/756747d4b439e3e1159282ae89f17eefebbe9b25"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/88484bde6f12126616b38e43b6c00edcd941f615",
          "url": "https://git.kernel.org/stable/c/88484bde6f12126616b38e43b6c00edcd941f615"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c3c0f0ddd851b3fa3e9d3450bbcd561f4f850469",
          "url": "https://git.kernel.org/stable/c/c3c0f0ddd851b3fa3e9d3450bbcd561f4f850469"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ef7311101ca43dd73b45bca7a30ac72d9535ff87",
          "url": "https://git.kernel.org/stable/c/ef7311101ca43dd73b45bca7a30ac72d9535ff87"
        }
      ],
      "release_date": "2025-10-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39691",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/buffer: fix use-after-free when call bh_read() helper\n\nThere's issue as follows:\nBUG: KASAN: stack-out-of-bounds in end_buffer_read_sync+0xe3/0x110\nRead of size 8 at addr ffffc9000168f7f8 by task swapper/3/0\nCPU: 3 UID: 0 PID: 0 Comm: swapper/3 Not tainted 6.16.0-862.14.0.6.x86_64\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996)\nCall Trace:\n <IRQ>\n dump_stack_lvl+0x55/0x70\n print_address_description.constprop.0+0x2c/0x390\n print_report+0xb4/0x270\n kasan_report+0xb8/0xf0\n end_buffer_read_sync+0xe3/0x110\n end_bio_bh_io_sync+0x56/0x80\n blk_update_request+0x30a/0x720\n scsi_end_request+0x51/0x2b0\n scsi_io_completion+0xe3/0x480\n ? scsi_device_unbusy+0x11e/0x160\n blk_complete_reqs+0x7b/0x90\n handle_softirqs+0xef/0x370\n irq_exit_rcu+0xa5/0xd0\n sysvec_apic_timer_interrupt+0x6e/0x90\n </IRQ>\n\n Above issue happens when do ntfs3 filesystem mount, issue may happens\n as follows:\n           mount                            IRQ\nntfs_fill_super\n  read_cache_page\n    do_read_cache_folio\n      filemap_read_folio\n        mpage_read_folio\n\t do_mpage_readpage\n\t  ntfs_get_block_vbo\n\t   bh_read\n\t     submit_bh\n\t     wait_on_buffer(bh);\n\t                            blk_complete_reqs\n\t\t\t\t     scsi_io_completion\n\t\t\t\t      scsi_end_request\n\t\t\t\t       blk_update_request\n\t\t\t\t        end_bio_bh_io_sync\n\t\t\t\t\t end_buffer_read_sync\n\t\t\t\t\t  __end_buffer_read_notouch\n\t\t\t\t\t   unlock_buffer\n\n            wait_on_buffer(bh);--> return will return to caller\n\n\t\t\t\t\t  put_bh\n\t\t\t\t\t    --> trigger stack-out-of-bounds\nIn the mpage_read_folio() function, the stack variable 'map_bh' is\npassed to ntfs_get_block_vbo(). Once unlock_buffer() unlocks and\nwait_on_buffer() returns to continue processing, the stack variable\nis likely to be reclaimed. Consequently, during the end_buffer_read_sync()\nprocess, calling put_bh() may result in stack overrun.\n\nIf the bh is not allocated on the stack, it belongs to a folio.  Freeing\na buffer head which belongs to a folio is done by drop_buffers() which\nwill fail to free buffers which are still locked.  So it is safe to call\nput_bh() before __end_buffer_read_notouch().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39691"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/03b40bf5d0389ca23ae6857ee25789f0e0b47ce8",
          "url": "https://git.kernel.org/stable/c/03b40bf5d0389ca23ae6857ee25789f0e0b47ce8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/042cf48ecf67f72c8b3846c7fac678f472712ff3",
          "url": "https://git.kernel.org/stable/c/042cf48ecf67f72c8b3846c7fac678f472712ff3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3169edb8945c295cf89120fc6b2c35cfe3ad4c9e",
          "url": "https://git.kernel.org/stable/c/3169edb8945c295cf89120fc6b2c35cfe3ad4c9e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/70a09115da586bf662c3bae9c0c4a1b99251fad9",
          "url": "https://git.kernel.org/stable/c/70a09115da586bf662c3bae9c0c4a1b99251fad9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7375f22495e7cd1c5b3b5af9dcc4f6dffe34ce49",
          "url": "https://git.kernel.org/stable/c/7375f22495e7cd1c5b3b5af9dcc4f6dffe34ce49"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/90b5193edb323fefbee0e4e5bc39ed89dcc37719",
          "url": "https://git.kernel.org/stable/c/90b5193edb323fefbee0e4e5bc39ed89dcc37719"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c58c6b532b7b69537cfd9ef701c7e37cdcf79dc4",
          "url": "https://git.kernel.org/stable/c/c58c6b532b7b69537cfd9ef701c7e37cdcf79dc4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c5aa6ba1127307ab5dc3773eaf40d73a3423841f",
          "url": "https://git.kernel.org/stable/c/c5aa6ba1127307ab5dc3773eaf40d73a3423841f"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-05T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38428",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: ims-pcu - check record size in ims_pcu_flash_firmware()\n\nThe \"len\" variable comes from the firmware and we generally do\ntrust firmware, but it's always better to double check.  If the \"len\"\nis too large it could result in memory corruption when we do\n\"memcpy(fragment->data, rec->data, len);\"",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38428"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/17474a56acf708bf6b2d174c06ed26abad0a9fd6",
          "url": "https://git.kernel.org/stable/c/17474a56acf708bf6b2d174c06ed26abad0a9fd6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5a8cd6ae8393e2eaebf51d420d5374821ef2af87",
          "url": "https://git.kernel.org/stable/c/5a8cd6ae8393e2eaebf51d420d5374821ef2af87"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/74661516daee1eadebede8dc607b6830530096ec",
          "url": "https://git.kernel.org/stable/c/74661516daee1eadebede8dc607b6830530096ec"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8e03f1c7d50343bf21da54873301bc4fa647479f",
          "url": "https://git.kernel.org/stable/c/8e03f1c7d50343bf21da54873301bc4fa647479f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a95ef0199e80f3384eb992889322957d26c00102",
          "url": "https://git.kernel.org/stable/c/a95ef0199e80f3384eb992889322957d26c00102"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c1b9d140b0807c6aee4bb53e1bfa4e391e3dc204",
          "url": "https://git.kernel.org/stable/c/c1b9d140b0807c6aee4bb53e1bfa4e391e3dc204"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d63706d9f73846106fde28b284f08e01b92ce9f1",
          "url": "https://git.kernel.org/stable/c/d63706d9f73846106fde28b284f08e01b92ce9f1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e5a2481dc2a0b430f49276d7482793a8923631d6",
          "url": "https://git.kernel.org/stable/c/e5a2481dc2a0b430f49276d7482793a8923631d6"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-25T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53521",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ses: Fix slab-out-of-bounds in ses_intf_remove()\n\nA fix for:\n\nBUG: KASAN: slab-out-of-bounds in ses_intf_remove+0x23f/0x270 [ses]\nRead of size 8 at addr ffff88a10d32e5d8 by task rmmod/12013\n\nWhen edev->components is zero, accessing edev->component[0] members is\nwrong.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53521"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0595cdb587726b4f0fa780eb7462e3679d141e82",
          "url": "https://git.kernel.org/stable/c/0595cdb587726b4f0fa780eb7462e3679d141e82"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2fb1fa8425cce2dc4dce298275d22d7077694b73",
          "url": "https://git.kernel.org/stable/c/2fb1fa8425cce2dc4dce298275d22d7077694b73"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/40af9a6deed723485e05b7d3255a28750692e8db",
          "url": "https://git.kernel.org/stable/c/40af9a6deed723485e05b7d3255a28750692e8db"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/578797f0c8cbc2e3ec5fc0dab87087b4c7073686",
          "url": "https://git.kernel.org/stable/c/578797f0c8cbc2e3ec5fc0dab87087b4c7073686"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/76f7050537476ac062ec23a544fbca8270f2d08b",
          "url": "https://git.kernel.org/stable/c/76f7050537476ac062ec23a544fbca8270f2d08b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/82143faf01dda831b89eccef60c39ef8575ab08a",
          "url": "https://git.kernel.org/stable/c/82143faf01dda831b89eccef60c39ef8575ab08a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/87e47be38d205df338c52ead43f23b2864567423",
          "url": "https://git.kernel.org/stable/c/87e47be38d205df338c52ead43f23b2864567423"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8f9542cad6c27297c8391de3a659f0b7948495d0",
          "url": "https://git.kernel.org/stable/c/8f9542cad6c27297c8391de3a659f0b7948495d0"
        }
      ],
      "release_date": "2025-10-01T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38482",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: das6402: Fix bit shift out of bounds\n\nWhen checking for a supported IRQ number, the following test is used:\n\n\t/* IRQs 2,3,5,6,7, 10,11,15 are valid for \"enhanced\" mode */\n\tif ((1 << it->options[1]) & 0x8cec) {\n\nHowever, `it->options[i]` is an unchecked `int` value from userspace, so\nthe shift amount could be negative or out of bounds.  Fix the test by\nrequiring `it->options[1]` to be within bounds before proceeding with\nthe original test.  Valid `it->options[1]` values that select the IRQ\nwill be in the range [1,15]. The value 0 explicitly disables the use of\ninterrupts.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38482"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3eab654f5d199ecd45403c6588cda63e491fcfca",
          "url": "https://git.kernel.org/stable/c/3eab654f5d199ecd45403c6588cda63e491fcfca"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4a3c18cde02e35aba87e0ad5672b3e1c72dda5a4",
          "url": "https://git.kernel.org/stable/c/4a3c18cde02e35aba87e0ad5672b3e1c72dda5a4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/70f2b28b5243df557f51c054c20058ae207baaac",
          "url": "https://git.kernel.org/stable/c/70f2b28b5243df557f51c054c20058ae207baaac"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/73f34d609397805c20d6b2ef5c07a4cbf7c4d63a",
          "url": "https://git.kernel.org/stable/c/73f34d609397805c20d6b2ef5c07a4cbf7c4d63a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8a3637027ceeba4ca5e500b23cb7d24c25592513",
          "url": "https://git.kernel.org/stable/c/8a3637027ceeba4ca5e500b23cb7d24c25592513"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a15e9c175f783298c4ee48146be6841335400406",
          "url": "https://git.kernel.org/stable/c/a15e9c175f783298c4ee48146be6841335400406"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a18a42e77545afcacd6a2b8d9fc16191b87454df",
          "url": "https://git.kernel.org/stable/c/a18a42e77545afcacd6a2b8d9fc16191b87454df"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/de8da1063cce9234d55c8270d9bdf4cf84411c80",
          "url": "https://git.kernel.org/stable/c/de8da1063cce9234d55c8270d9bdf4cf84411c80"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-28T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53285",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: add bounds checking in get_max_inline_xattr_value_size()\n\nNormally the extended attributes in the inode body would have been\nchecked when the inode is first opened, but if someone is writing to\nthe block device while the file system is mounted, it's possible for\nthe inode table to get corrupted.  Add bounds checking to avoid\nreading beyond the end of allocated memory if this happens.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53285"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1d2caddbeeee56fbbc36b428c5b909c3ad88eb7f",
          "url": "https://git.kernel.org/stable/c/1d2caddbeeee56fbbc36b428c5b909c3ad88eb7f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2220eaf90992c11d888fe771055d4de330385f01",
          "url": "https://git.kernel.org/stable/c/2220eaf90992c11d888fe771055d4de330385f01"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3d7b8fbcd2273e2b9f4c6de5ce2f4c0cd3cb1205",
          "url": "https://git.kernel.org/stable/c/3d7b8fbcd2273e2b9f4c6de5ce2f4c0cd3cb1205"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4597554b4f7b29e7fd78aa449bab648f8da4ee2c",
          "url": "https://git.kernel.org/stable/c/4597554b4f7b29e7fd78aa449bab648f8da4ee2c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/486efbbc9445dca7890a1b86adbccb88b91284b0",
          "url": "https://git.kernel.org/stable/c/486efbbc9445dca7890a1b86adbccb88b91284b0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5a229d21b98d132673096710e8281ef522dab1d1",
          "url": "https://git.kernel.org/stable/c/5a229d21b98d132673096710e8281ef522dab1d1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/88a06a94942c5c0a896e9da1113a6bb29e36cbef",
          "url": "https://git.kernel.org/stable/c/88a06a94942c5c0a896e9da1113a6bb29e36cbef"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e780058bd75614b66882bc02620ddbd884171560",
          "url": "https://git.kernel.org/stable/c/e780058bd75614b66882bc02620ddbd884171560"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f22b274429e88d3dc7e79d375b56ce4f2f59f0b4",
          "url": "https://git.kernel.org/stable/c/f22b274429e88d3dc7e79d375b56ce4f2f59f0b4"
        }
      ],
      "release_date": "2025-09-16T08:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53484",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlib: cpu_rmap: Avoid use after free on rmap->obj array entries\n\nWhen calling irq_set_affinity_notifier() with NULL at the notify\nargument, it will cause freeing of the glue pointer in the\ncorresponding array entry but will leave the pointer in the array. A\nsubsequent call to free_irq_cpu_rmap() will try to free this entry again\nleading to possible use after free.\n\nFix that by setting NULL to the array entry and checking that we have\nnon-zero at the array entry when iterating over the array in\nfree_irq_cpu_rmap().\n\nThe current code does not suffer from this since there are no cases\nwhere irq_set_affinity_notifier(irq, NULL) (note the NULL passed for the\nnotify arg) is called, followed by a call to free_irq_cpu_rmap() so we\ndon't hit and issue. Subsequent patches in this series excersize this\nflow, hence the required fix.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53484"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4e0473f1060aa49621d40a113afde24818101d37",
          "url": "https://git.kernel.org/stable/c/4e0473f1060aa49621d40a113afde24818101d37"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/67bca5f1d644f4e79b694abd8052a177de81c37f",
          "url": "https://git.kernel.org/stable/c/67bca5f1d644f4e79b694abd8052a177de81c37f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/981f339d2905b6a92ef59358158b326493aecac5",
          "url": "https://git.kernel.org/stable/c/981f339d2905b6a92ef59358158b326493aecac5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c6ed54dd90698dc0744d669524cc1c122ded8a16",
          "url": "https://git.kernel.org/stable/c/c6ed54dd90698dc0744d669524cc1c122ded8a16"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c9115f49cf260d24d8b5f2d9a4b63cb31a627bb4",
          "url": "https://git.kernel.org/stable/c/c9115f49cf260d24d8b5f2d9a4b63cb31a627bb4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cc2d2b3dbfb0ba57bc027fb7e1121250c50e4000",
          "url": "https://git.kernel.org/stable/c/cc2d2b3dbfb0ba57bc027fb7e1121250c50e4000"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d1308bd0b24cb1d78fa2747d5fa3e055cc628a48",
          "url": "https://git.kernel.org/stable/c/d1308bd0b24cb1d78fa2747d5fa3e055cc628a48"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f748e15253833b771acbede14ea98f50831ac289",
          "url": "https://git.kernel.org/stable/c/f748e15253833b771acbede14ea98f50831ac289"
        }
      ],
      "release_date": "2025-10-01T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38245",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: Release atm_dev_mutex after removing procfs in atm_dev_deregister().\n\nsyzbot reported a warning below during atm_dev_register(). [0]\n\nBefore creating a new device and procfs/sysfs for it, atm_dev_register()\nlooks up a duplicated device by __atm_dev_lookup().  These operations are\ndone under atm_dev_mutex.\n\nHowever, when removing a device in atm_dev_deregister(), it releases the\nmutex just after removing the device from the list that __atm_dev_lookup()\niterates over.\n\nSo, there will be a small race window where the device does not exist on\nthe device list but procfs/sysfs are still not removed, triggering the\nsplat.\n\nLet's hold the mutex until procfs/sysfs are removed in\natm_dev_deregister().\n\n[0]:\nproc_dir_entry 'atm/atmtcp:0' already registered\nWARNING: CPU: 0 PID: 5919 at fs/proc/generic.c:377 proc_register+0x455/0x5f0 fs/proc/generic.c:377\nModules linked in:\nCPU: 0 UID: 0 PID: 5919 Comm: syz-executor284 Not tainted 6.16.0-rc2-syzkaller-00047-g52da431bf03b #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025\nRIP: 0010:proc_register+0x455/0x5f0 fs/proc/generic.c:377\nCode: 48 89 f9 48 c1 e9 03 80 3c 01 00 0f 85 a2 01 00 00 48 8b 44 24 10 48 c7 c7 20 c0 c2 8b 48 8b b0 d8 00 00 00 e8 0c 02 1c ff 90 <0f> 0b 90 90 48 c7 c7 80 f2 82 8e e8 0b de 23 09 48 8b 4c 24 28 48\nRSP: 0018:ffffc9000466fa30 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff817ae248\nRDX: ffff888026280000 RSI: ffffffff817ae255 RDI: 0000000000000001\nRBP: ffff8880232bed48 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000001 R12: ffff888076ed2140\nR13: dffffc0000000000 R14: ffff888078a61340 R15: ffffed100edda444\nFS:  00007f38b3b0c6c0(0000) GS:ffff888124753000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f38b3bdf953 CR3: 0000000076d58000 CR4: 00000000003526f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n proc_create_data+0xbe/0x110 fs/proc/generic.c:585\n atm_proc_dev_register+0x112/0x1e0 net/atm/proc.c:361\n atm_dev_register+0x46d/0x890 net/atm/resources.c:113\n atmtcp_create+0x77/0x210 drivers/atm/atmtcp.c:369\n atmtcp_attach drivers/atm/atmtcp.c:403 [inline]\n atmtcp_ioctl+0x2f9/0xd60 drivers/atm/atmtcp.c:464\n do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159\n sock_do_ioctl+0x115/0x280 net/socket.c:1190\n sock_ioctl+0x227/0x6b0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:907 [inline]\n __se_sys_ioctl fs/ioctl.c:893 [inline]\n __x64_sys_ioctl+0x18b/0x210 fs/ioctl.c:893\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f38b3b74459\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f38b3b0c198 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 00007f38b3bfe318 RCX: 00007f38b3b74459\nRDX: 0000000000000000 RSI: 0000000000006180 RDI: 0000000000000005\nRBP: 00007f38b3bfe310 R08: 65732f636f72702f R09: 65732f636f72702f\nR10: 65732f636f72702f R11: 0000000000000246 R12: 00007f38b3bcb0ac\nR13: 00007f38b3b0c1a0 R14: 0000200000000200 R15: 00007f38b3bcb03b\n </TASK>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38245"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/26248d5d68c865b888d632162abbf8130645622c",
          "url": "https://git.kernel.org/stable/c/26248d5d68c865b888d632162abbf8130645622c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2a8dcee649d12f69713f2589171a1caf6d4fa439",
          "url": "https://git.kernel.org/stable/c/2a8dcee649d12f69713f2589171a1caf6d4fa439"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4bb1bb438134d9ee6b97cc07289dd7c569092eec",
          "url": "https://git.kernel.org/stable/c/4bb1bb438134d9ee6b97cc07289dd7c569092eec"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6922f1a048c090f10704bbef4a3a1e81932d2e0a",
          "url": "https://git.kernel.org/stable/c/6922f1a048c090f10704bbef4a3a1e81932d2e0a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a433791aeaea6e84df709e0b9584b9bbe040cd1c",
          "url": "https://git.kernel.org/stable/c/a433791aeaea6e84df709e0b9584b9bbe040cd1c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ae539d963a17443ec54cba8a767e4ffa318264f4",
          "url": "https://git.kernel.org/stable/c/ae539d963a17443ec54cba8a767e4ffa318264f4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b2e40fcfe1575faaa548f87614006d3fe44c779e",
          "url": "https://git.kernel.org/stable/c/b2e40fcfe1575faaa548f87614006d3fe44c779e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cabed6ba92a9a8c09da02a3f20e32ecd80989896",
          "url": "https://git.kernel.org/stable/c/cabed6ba92a9a8c09da02a3f20e32ecd80989896"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-09T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38680",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format()\n\nThe buffer length check before calling uvc_parse_format() only ensured\nthat the buffer has at least 3 bytes (buflen > 2), buf the function\naccesses buffer[3], requiring at least 4 bytes.\n\nThis can lead to an out-of-bounds read if the buffer has exactly 3 bytes.\n\nFix it by checking that the buffer has at least 4 bytes in\nuvc_parse_format().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38680"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1e269581b3aa5962fdc52757ab40da286168c087",
          "url": "https://git.kernel.org/stable/c/1e269581b3aa5962fdc52757ab40da286168c087"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/424980d33b3f816485513e538610168b03fab9f1",
          "url": "https://git.kernel.org/stable/c/424980d33b3f816485513e538610168b03fab9f1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6d4a7c0b296162354b6fc759a1475b9d57ddfaa6",
          "url": "https://git.kernel.org/stable/c/6d4a7c0b296162354b6fc759a1475b9d57ddfaa6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/782b6a718651eda3478b1824b37a8b3185d2740c",
          "url": "https://git.kernel.org/stable/c/782b6a718651eda3478b1824b37a8b3185d2740c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8343f3fe0b755925f83d60b05e92bf4396879758",
          "url": "https://git.kernel.org/stable/c/8343f3fe0b755925f83d60b05e92bf4396879758"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9ad554217c9b945031c73df4e8176a475e2dea57",
          "url": "https://git.kernel.org/stable/c/9ad554217c9b945031c73df4e8176a475e2dea57"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a97e062e4ff3dab84a2f1eb811e9eddc6699e2a9",
          "url": "https://git.kernel.org/stable/c/a97e062e4ff3dab84a2f1eb811e9eddc6699e2a9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cac702a439050df65272c49184aef7975fe3eff2",
          "url": "https://git.kernel.org/stable/c/cac702a439050df65272c49184aef7975fe3eff2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ffdd82182953df643aa63d999b6f1653d0c93778",
          "url": "https://git.kernel.org/stable/c/ffdd82182953df643aa63d999b6f1653d0c93778"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38530",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: pcl812: Fix bit shift out of bounds\n\nWhen checking for a supported IRQ number, the following test is used:\n\n\tif ((1 << it->options[1]) & board->irq_bits) {\n\nHowever, `it->options[i]` is an unchecked `int` value from userspace, so\nthe shift amount could be negative or out of bounds.  Fix the test by\nrequiring `it->options[1]` to be within bounds before proceeding with\nthe original test.  Valid `it->options[1]` values that select the IRQ\nwill be in the range [1,15]. The value 0 explicitly disables the use of\ninterrupts.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38530"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0489c30d080f07cc7f09d04de723d8c2ccdb61ef",
          "url": "https://git.kernel.org/stable/c/0489c30d080f07cc7f09d04de723d8c2ccdb61ef"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/16c173abee315953fd17a279352fec4a1faee862",
          "url": "https://git.kernel.org/stable/c/16c173abee315953fd17a279352fec4a1faee862"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/29ef03e5b84431171d6b77b822985b54bc44b793",
          "url": "https://git.kernel.org/stable/c/29ef03e5b84431171d6b77b822985b54bc44b793"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/374d9b3eb4b08407997ef1fce96119d31e0c0bc4",
          "url": "https://git.kernel.org/stable/c/374d9b3eb4b08407997ef1fce96119d31e0c0bc4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5bfa301e1e59a9b1a7b62a800b54852337c97416",
          "url": "https://git.kernel.org/stable/c/5bfa301e1e59a9b1a7b62a800b54852337c97416"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7e470d8efd10725b189ca8951973a8425932398a",
          "url": "https://git.kernel.org/stable/c/7e470d8efd10725b189ca8951973a8425932398a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a27e27eee313fe1c450b6af1e80e64412546cab4",
          "url": "https://git.kernel.org/stable/c/a27e27eee313fe1c450b6af1e80e64412546cab4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b14b076ce593f72585412fc7fd3747e03a5e3632",
          "url": "https://git.kernel.org/stable/c/b14b076ce593f72585412fc7fd3747e03a5e3632"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-08-16T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38715",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfs: fix slab-out-of-bounds in hfs_bnode_read()\n\nThis patch introduces is_bnode_offset_valid() method that checks\nthe requested offset value. Also, it introduces\ncheck_and_correct_requested_length() method that checks and\ncorrect the requested length (if it is necessary). These methods\nare used in hfs_bnode_read(), hfs_bnode_write(), hfs_bnode_clear(),\nhfs_bnode_copy(), and hfs_bnode_move() with the goal to prevent\nthe access out of allocated memory and triggering the crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38715"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/384a66b89f9540a9a8cb0f48807697dfabaece4c",
          "url": "https://git.kernel.org/stable/c/384a66b89f9540a9a8cb0f48807697dfabaece4c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/67ecc81f6492275c9c54280532f558483c99c90e",
          "url": "https://git.kernel.org/stable/c/67ecc81f6492275c9c54280532f558483c99c90e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a1a60e79502279f996e55052f50cc14919020475",
          "url": "https://git.kernel.org/stable/c/a1a60e79502279f996e55052f50cc14919020475"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a431930c9bac518bf99d6b1da526a7f37ddee8d8",
          "url": "https://git.kernel.org/stable/c/a431930c9bac518bf99d6b1da526a7f37ddee8d8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e7d2dc2421e821e4045775e6dc226378328de6f6",
          "url": "https://git.kernel.org/stable/c/e7d2dc2421e821e4045775e6dc226378328de6f6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/eec522fd0d28106b14a59ab2d658605febe4a3bb",
          "url": "https://git.kernel.org/stable/c/eec522fd0d28106b14a59ab2d658605febe4a3bb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/efc095b35b23297e419c2ab4fc1ed1a8f0781a29",
          "url": "https://git.kernel.org/stable/c/efc095b35b23297e419c2ab4fc1ed1a8f0781a29"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fc7f732984ec91f30be3e574e0644066d07f2b78",
          "url": "https://git.kernel.org/stable/c/fc7f732984ec91f30be3e574e0644066d07f2b78"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fe2891a9c43ab87d1a210d61e6438ca6936e2f62",
          "url": "https://git.kernel.org/stable/c/fe2891a9c43ab87d1a210d61e6438ca6936e2f62"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38483",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: das16m1: Fix bit shift out of bounds\n\nWhen checking for a supported IRQ number, the following test is used:\n\n\t/* only irqs 2, 3, 4, 5, 6, 7, 10, 11, 12, 14, and 15 are valid */\n\tif ((1 << it->options[1]) & 0xdcfc) {\n\nHowever, `it->options[i]` is an unchecked `int` value from userspace, so\nthe shift amount could be negative or out of bounds.  Fix the test by\nrequiring `it->options[1]` to be within bounds before proceeding with\nthe original test.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38483"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/076b13ee60eb01ed0d140ef261f95534562a3077",
          "url": "https://git.kernel.org/stable/c/076b13ee60eb01ed0d140ef261f95534562a3077"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/539bdff832adac9ea653859fa0b6bc62e743329c",
          "url": "https://git.kernel.org/stable/c/539bdff832adac9ea653859fa0b6bc62e743329c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/65c03e6fc524eb2868abedffd8a4613d78abc288",
          "url": "https://git.kernel.org/stable/c/65c03e6fc524eb2868abedffd8a4613d78abc288"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/adb7df8a8f9d788423e161b779764527dd3ec2d0",
          "url": "https://git.kernel.org/stable/c/adb7df8a8f9d788423e161b779764527dd3ec2d0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b3c95fa508e5dc3da60520eea92a5241095ceef1",
          "url": "https://git.kernel.org/stable/c/b3c95fa508e5dc3da60520eea92a5241095ceef1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d1291c69f46d6572b2cf75960dd8975d7ab2176b",
          "url": "https://git.kernel.org/stable/c/d1291c69f46d6572b2cf75960dd8975d7ab2176b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ed93c6f68a3be06e4e0c331c6e751f462dee3932",
          "url": "https://git.kernel.org/stable/c/ed93c6f68a3be06e4e0c331c6e751f462dee3932"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f211572818ed5bec2b3f5d4e0719ef8699b3c269",
          "url": "https://git.kernel.org/stable/c/f211572818ed5bec2b3f5d4e0719ef8699b3c269"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-28T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38204",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: fix array-index-out-of-bounds read in add_missing_indices\n\nstbl is s8 but it must contain offsets into slot which can go from 0 to\n127.\n\nAdded a bound check for that error and return -EIO if the check fails.\nAlso make jfs_readdir return with error if add_missing_indices returns\nwith an error.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38204"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/44618bee303bed151ef3a525ff79fbd7689593b5",
          "url": "https://git.kernel.org/stable/c/44618bee303bed151ef3a525ff79fbd7689593b5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5dff41a86377563f7a2b968aae00d25b4ceb37c9",
          "url": "https://git.kernel.org/stable/c/5dff41a86377563f7a2b968aae00d25b4ceb37c9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/81af4b34fd72d390d7f237c6a545cc6d09707956",
          "url": "https://git.kernel.org/stable/c/81af4b34fd72d390d7f237c6a545cc6d09707956"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bfa4655d28f338e68d345aed80d19be7999bbce2",
          "url": "https://git.kernel.org/stable/c/bfa4655d28f338e68d345aed80d19be7999bbce2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c8399564a58fb6ea2ff21a6fd278417943cb51a5",
          "url": "https://git.kernel.org/stable/c/c8399564a58fb6ea2ff21a6fd278417943cb51a5"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        }
      ],
      "release_date": "2025-07-04T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53153",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: Fix use after free for wext\n\nKey information in wext.connect is not reset on (re)connect and can hold\ndata from a previous connection.\n\nReset key data to avoid that drivers or mac80211 incorrectly detect a\nWEP connection request and access the freed or already reused memory.\n\nAdditionally optimize cfg80211_sme_connect() and avoid an useless\nschedule of conn_work.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53153"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/015b8cc5e7c4d7bb671f1984d7b7338c310b185b",
          "url": "https://git.kernel.org/stable/c/015b8cc5e7c4d7bb671f1984d7b7338c310b185b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/22dfb21bf1cd876616d45cda1bc6daa89eec6747",
          "url": "https://git.kernel.org/stable/c/22dfb21bf1cd876616d45cda1bc6daa89eec6747"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2cfe78619b0de6d2da773978bc2d22797212eaa7",
          "url": "https://git.kernel.org/stable/c/2cfe78619b0de6d2da773978bc2d22797212eaa7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/66af4a2ab1d65d556d638cb9555a3b823c2557a9",
          "url": "https://git.kernel.org/stable/c/66af4a2ab1d65d556d638cb9555a3b823c2557a9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6f1959c17d4cb5b74af6fc31dc787e1dc3e4f6e2",
          "url": "https://git.kernel.org/stable/c/6f1959c17d4cb5b74af6fc31dc787e1dc3e4f6e2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a2a92b3e9d8e03ee3f9ee407fc46a9b4bd02d8b6",
          "url": "https://git.kernel.org/stable/c/a2a92b3e9d8e03ee3f9ee407fc46a9b4bd02d8b6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f4b6a138efb8a32507b8946104e32cb926308da7",
          "url": "https://git.kernel.org/stable/c/f4b6a138efb8a32507b8946104e32cb926308da7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fd081afd21eb35b968b0330700c43ec94986e1c4",
          "url": "https://git.kernel.org/stable/c/fd081afd21eb35b968b0330700c43ec94986e1c4"
        }
      ],
      "release_date": "2025-09-15T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53587",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nring-buffer: Sync IRQ works before buffer destruction\n\nIf something was written to the buffer just before destruction,\nit may be possible (maybe not in a real system, but it did\nhappen in ARCH=um with time-travel) to destroy the ringbuffer\nbefore the IRQ work ran, leading this KASAN report (or a crash\nwithout KASAN):\n\n    BUG: KASAN: slab-use-after-free in irq_work_run_list+0x11a/0x13a\n    Read of size 8 at addr 000000006d640a48 by task swapper/0\n\n    CPU: 0 PID: 0 Comm: swapper Tainted: G        W  O       6.3.0-rc1 #7\n    Stack:\n     60c4f20f 0c203d48 41b58ab3 60f224fc\n     600477fa 60f35687 60c4f20f 601273dd\n     00000008 6101eb00 6101eab0 615be548\n    Call Trace:\n     [<60047a58>] show_stack+0x25e/0x282\n     [<60c609e0>] dump_stack_lvl+0x96/0xfd\n     [<60c50d4c>] print_report+0x1a7/0x5a8\n     [<603078d3>] kasan_report+0xc1/0xe9\n     [<60308950>] __asan_report_load8_noabort+0x1b/0x1d\n     [<60232844>] irq_work_run_list+0x11a/0x13a\n     [<602328b4>] irq_work_tick+0x24/0x34\n     [<6017f9dc>] update_process_times+0x162/0x196\n     [<6019f335>] tick_sched_handle+0x1a4/0x1c3\n     [<6019fd9e>] tick_sched_timer+0x79/0x10c\n     [<601812b9>] __hrtimer_run_queues.constprop.0+0x425/0x695\n     [<60182913>] hrtimer_interrupt+0x16c/0x2c4\n     [<600486a3>] um_timer+0x164/0x183\n     [...]\n\n    Allocated by task 411:\n     save_stack_trace+0x99/0xb5\n     stack_trace_save+0x81/0x9b\n     kasan_save_stack+0x2d/0x54\n     kasan_set_track+0x34/0x3e\n     kasan_save_alloc_info+0x25/0x28\n     ____kasan_kmalloc+0x8b/0x97\n     __kasan_kmalloc+0x10/0x12\n     __kmalloc+0xb2/0xe8\n     load_elf_phdrs+0xee/0x182\n     [...]\n\n    The buggy address belongs to the object at 000000006d640800\n     which belongs to the cache kmalloc-1k of size 1024\n    The buggy address is located 584 bytes inside of\n     freed 1024-byte region [000000006d640800, 000000006d640c00)\n\nAdd the appropriate irq_work_sync() so the work finishes before\nthe buffers are destroyed.\n\nPrior to the commit in the Fixes tag below, there was only a\nsingle global IRQ work, so this issue didn't exist.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53587"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0a65165bd24ee9231191597b7c232376fcd70cdb",
          "url": "https://git.kernel.org/stable/c/0a65165bd24ee9231191597b7c232376fcd70cdb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1c99f65d6af2a454bfd5207b4f6a97c8474a1191",
          "url": "https://git.kernel.org/stable/c/1c99f65d6af2a454bfd5207b4f6a97c8474a1191"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2399b1fda025e939b6fb1ac94505bcf718534e65",
          "url": "https://git.kernel.org/stable/c/2399b1fda025e939b6fb1ac94505bcf718534e65"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2702b67f59d455072a08dc40312f9b090d4dec04",
          "url": "https://git.kernel.org/stable/c/2702b67f59d455072a08dc40312f9b090d4dec04"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/372c5ee537b8366b64b691ba29e9335525e1655e",
          "url": "https://git.kernel.org/stable/c/372c5ee537b8366b64b691ba29e9335525e1655e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/675751bb20634f981498c7d66161584080cc061e",
          "url": "https://git.kernel.org/stable/c/675751bb20634f981498c7d66161584080cc061e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c63741e872fcfb10e153517750f7908f0c00f60d",
          "url": "https://git.kernel.org/stable/c/c63741e872fcfb10e153517750f7908f0c00f60d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d9834abd8b24d1fe8092859e436fe1e0fd467c61",
          "url": "https://git.kernel.org/stable/c/d9834abd8b24d1fe8092859e436fe1e0fd467c61"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fc6858b7f8e1221f62ce8c6ff8a13a349c32cd76",
          "url": "https://git.kernel.org/stable/c/fc6858b7f8e1221f62ce8c6ff8a13a349c32cd76"
        }
      ],
      "release_date": "2025-10-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49763",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nntfs: fix use-after-free in ntfs_attr_find()\n\nPatch series \"ntfs: fix bugs about Attribute\", v2.\n\nThis patchset fixes three bugs relative to Attribute in record:\n\nPatch 1 adds a sanity check to ensure that, attrs_offset field in first\nmft record loading from disk is within bounds.\n\nPatch 2 moves the ATTR_RECORD's bounds checking earlier, to avoid\ndereferencing ATTR_RECORD before checking this ATTR_RECORD is within\nbounds.\n\nPatch 3 adds an overflow checking to avoid possible forever loop in\nntfs_attr_find().\n\nWithout patch 1 and patch 2, the kernel triggersa KASAN use-after-free\ndetection as reported by Syzkaller.\n\nAlthough one of patch 1 or patch 2 can fix this, we still need both of\nthem.  Because patch 1 fixes the root cause, and patch 2 not only fixes\nthe direct cause, but also fixes the potential out-of-bounds bug.\n\n\nThis patch (of 3):\n\nSyzkaller reported use-after-free read as follows:\n==================================================================\nBUG: KASAN: use-after-free in ntfs_attr_find+0xc02/0xce0 fs/ntfs/attrib.c:597\nRead of size 2 at addr ffff88807e352009 by task syz-executor153/3607\n\n[...]\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:317 [inline]\n print_report.cold+0x2ba/0x719 mm/kasan/report.c:433\n kasan_report+0xb1/0x1e0 mm/kasan/report.c:495\n ntfs_attr_find+0xc02/0xce0 fs/ntfs/attrib.c:597\n ntfs_attr_lookup+0x1056/0x2070 fs/ntfs/attrib.c:1193\n ntfs_read_inode_mount+0x89a/0x2580 fs/ntfs/inode.c:1845\n ntfs_fill_super+0x1799/0x9320 fs/ntfs/super.c:2854\n mount_bdev+0x34d/0x410 fs/super.c:1400\n legacy_get_tree+0x105/0x220 fs/fs_context.c:610\n vfs_get_tree+0x89/0x2f0 fs/super.c:1530\n do_new_mount fs/namespace.c:3040 [inline]\n path_mount+0x1326/0x1e20 fs/namespace.c:3370\n do_mount fs/namespace.c:3383 [inline]\n __do_sys_mount fs/namespace.c:3591 [inline]\n __se_sys_mount fs/namespace.c:3568 [inline]\n __x64_sys_mount+0x27f/0x300 fs/namespace.c:3568\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n [...]\n </TASK>\n\nThe buggy address belongs to the physical page:\npage:ffffea0001f8d400 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7e350\nhead:ffffea0001f8d400 order:3 compound_mapcount:0 compound_pincount:0\nflags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000010200 0000000000000000 dead000000000122 ffff888011842140\nraw: 0000000000000000 0000000000040004 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\nMemory state around the buggy address:\n ffff88807e351f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n ffff88807e351f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n>ffff88807e352000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n                      ^\n ffff88807e352080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n ffff88807e352100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n==================================================================\n\nKernel will loads $MFT/$DATA's first mft record in\nntfs_read_inode_mount().\n\nYet the problem is that after loading, kernel doesn't check whether\nattrs_offset field is a valid value.\n\nTo be more specific, if attrs_offset field is larger than bytes_allocated\nfield, then it may trigger the out-of-bounds read bug(reported as\nuse-after-free bug) in ntfs_attr_find(), when kernel tries to access the\ncorresponding mft record's attribute.\n\nThis patch solves it by adding the sanity check between attrs_offset field\nand bytes_allocated field, after loading the first mft record.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49763"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/266bd5306286316758e6246ea0345133427b0f62",
          "url": "https://git.kernel.org/stable/c/266bd5306286316758e6246ea0345133427b0f62"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4863f815463034f588a035cfd99cdca97a4f1069",
          "url": "https://git.kernel.org/stable/c/4863f815463034f588a035cfd99cdca97a4f1069"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5330c423b86263ac7883fef0260b9e2229cb531e",
          "url": "https://git.kernel.org/stable/c/5330c423b86263ac7883fef0260b9e2229cb531e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/79f3ac7dcd12c05b7539239a4c6fa229a50d786c",
          "url": "https://git.kernel.org/stable/c/79f3ac7dcd12c05b7539239a4c6fa229a50d786c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b825bfbbaafbe8da2037e3a778ad660c59f9e054",
          "url": "https://git.kernel.org/stable/c/b825bfbbaafbe8da2037e3a778ad660c59f9e054"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d0006d739738a658a9c29b438444259d9f71dfa0",
          "url": "https://git.kernel.org/stable/c/d0006d739738a658a9c29b438444259d9f71dfa0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d85a1bec8e8d552ab13163ca1874dcd82f3d1550",
          "url": "https://git.kernel.org/stable/c/d85a1bec8e8d552ab13163ca1874dcd82f3d1550"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fb2004bafd1932e08d21ca604ee5844f2b7f212d",
          "url": "https://git.kernel.org/stable/c/fb2004bafd1932e08d21ca604ee5844f2b7f212d"
        }
      ],
      "release_date": "2025-05-01T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53311",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix use-after-free of nilfs_root in dirtying inodes via iput\n\nDuring unmount process of nilfs2, nothing holds nilfs_root structure after\nnilfs2 detaches its writer in nilfs_detach_log_writer().  Previously,\nnilfs_evict_inode() could cause use-after-free read for nilfs_root if\ninodes are left in \"garbage_list\" and released by nilfs_dispose_list at\nthe end of nilfs_detach_log_writer(), and this bug was fixed by commit\n9b5a04ac3ad9 (\"nilfs2: fix use-after-free bug of nilfs_root in\nnilfs_evict_inode()\").\n\nHowever, it turned out that there is another possibility of UAF in the\ncall path where mark_inode_dirty_sync() is called from iput():\n\nnilfs_detach_log_writer()\n  nilfs_dispose_list()\n    iput()\n      mark_inode_dirty_sync()\n        __mark_inode_dirty()\n          nilfs_dirty_inode()\n            __nilfs_mark_inode_dirty()\n              nilfs_load_inode_block() --> causes UAF of nilfs_root struct\n\nThis can happen after commit 0ae45f63d4ef (\"vfs: add support for a\nlazytime mount option\"), which changed iput() to call\nmark_inode_dirty_sync() on its final reference if i_state has I_DIRTY_TIME\nflag and i_nlink is non-zero.\n\nThis issue appears after commit 28a65b49eb53 (\"nilfs2: do not write dirty\ndata after degenerating to read-only\") when using the syzbot reproducer,\nbut the issue has potentially existed before.\n\nFix this issue by adding a \"purging flag\" to the nilfs structure, setting\nthat flag while disposing the \"garbage_list\" and checking it in\n__nilfs_mark_inode_dirty().\n\nUnlike commit 9b5a04ac3ad9 (\"nilfs2: fix use-after-free bug of nilfs_root\nin nilfs_evict_inode()\"), this patch does not rely on ns_writer to\ndetermine whether to skip operations, so as not to break recovery on\nmount.  The nilfs_salvage_orphan_logs routine dirties the buffer of\nsalvaged data before attaching the log writer, so changing\n__nilfs_mark_inode_dirty() to skip the operation when ns_writer is NULL\nwill cause recovery write to fail.  The purpose of using the cleanup-only\nflag is to allow for narrowing of such conditions.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53311"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/11afd67f1b3c28eb216e50a3ca8dbcb69bb71793",
          "url": "https://git.kernel.org/stable/c/11afd67f1b3c28eb216e50a3ca8dbcb69bb71793"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3645510cf926e6af2f4d44899370d7e5331c93bd",
          "url": "https://git.kernel.org/stable/c/3645510cf926e6af2f4d44899370d7e5331c93bd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/37207240872456fbab44a110bde6640445233963",
          "url": "https://git.kernel.org/stable/c/37207240872456fbab44a110bde6640445233963"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5828d5f5dc877dcfdd7b23102e978e2ecfd86d82",
          "url": "https://git.kernel.org/stable/c/5828d5f5dc877dcfdd7b23102e978e2ecfd86d82"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7532ff6edbf5242376b24a95a2fefb59bb653e5a",
          "url": "https://git.kernel.org/stable/c/7532ff6edbf5242376b24a95a2fefb59bb653e5a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a3c3b4cbf9b8554120fb230e6516e980c6277487",
          "url": "https://git.kernel.org/stable/c/a3c3b4cbf9b8554120fb230e6516e980c6277487"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d2c539c216cce74837a9cf5804eb205939b82227",
          "url": "https://git.kernel.org/stable/c/d2c539c216cce74837a9cf5804eb205939b82227"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f8654743a0e6909dc634cbfad6db6816f10f3399",
          "url": "https://git.kernel.org/stable/c/f8654743a0e6909dc634cbfad6db6816f10f3399"
        }
      ],
      "release_date": "2025-09-16T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53675",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ses: Fix possible desc_ptr out-of-bounds accesses\n\nSanitize possible desc_ptr out-of-bounds accesses in\nses_enclosure_data_process().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53675"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/414418abc19fa4ccf730d273061a426c07a061d6",
          "url": "https://git.kernel.org/stable/c/414418abc19fa4ccf730d273061a426c07a061d6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4b8cae410472653a59e15af62c57c49b8e0a1201",
          "url": "https://git.kernel.org/stable/c/4b8cae410472653a59e15af62c57c49b8e0a1201"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/584892fd29a41ef424a148118a3103b16b94fb8c",
          "url": "https://git.kernel.org/stable/c/584892fd29a41ef424a148118a3103b16b94fb8c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/72021ae61a2bc6ca73cd593e255a10ed5f5dc5e7",
          "url": "https://git.kernel.org/stable/c/72021ae61a2bc6ca73cd593e255a10ed5f5dc5e7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/79ec5dd5fb07ecaea2f978c2d7a9f2f3526e4d19",
          "url": "https://git.kernel.org/stable/c/79ec5dd5fb07ecaea2f978c2d7a9f2f3526e4d19"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/801ab13d50cf3d26170ee073ea8bb4eececb76ab",
          "url": "https://git.kernel.org/stable/c/801ab13d50cf3d26170ee073ea8bb4eececb76ab"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c315560e3ef77c1d822249f1743e647dc9c9912a",
          "url": "https://git.kernel.org/stable/c/c315560e3ef77c1d822249f1743e647dc9c9912a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cffe09ca0555e235a42d6fa065e463c4b3d5b657",
          "url": "https://git.kernel.org/stable/c/cffe09ca0555e235a42d6fa065e463c4b3d5b657"
        }
      ],
      "release_date": "2025-10-07T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53676",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()\n\nThe function lio_target_nacl_info_show() uses sprintf() in a loop to print\ndetails for every iSCSI connection in a session without checking for the\nbuffer length. With enough iSCSI connections it's possible to overflow the\nbuffer provided by configfs and corrupt the memory.\n\nThis patch replaces sprintf() with sysfs_emit_at() that checks for buffer\nboundries.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53676"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0cac6cbb9908309352a5d30c1876882771d3da50",
          "url": "https://git.kernel.org/stable/c/0cac6cbb9908309352a5d30c1876882771d3da50"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/114b44dddea1f8f99576de3c0e6e9059012002fc",
          "url": "https://git.kernel.org/stable/c/114b44dddea1f8f99576de3c0e6e9059012002fc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2cbe6a88fbdd6e8aeab358eef61472e2de43d6f6",
          "url": "https://git.kernel.org/stable/c/2cbe6a88fbdd6e8aeab358eef61472e2de43d6f6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4738bf8b2d3635c2944b81b2a84d97b8c8b0978d",
          "url": "https://git.kernel.org/stable/c/4738bf8b2d3635c2944b81b2a84d97b8c8b0978d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5353df78c22623b42a71d51226d228a8413097e2",
          "url": "https://git.kernel.org/stable/c/5353df78c22623b42a71d51226d228a8413097e2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/801f287c93ff95582b0a2d2163f12870a2f076d4",
          "url": "https://git.kernel.org/stable/c/801f287c93ff95582b0a2d2163f12870a2f076d4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bbe3ff47bf09db8956bc2eeb49d2d514d256ad2a",
          "url": "https://git.kernel.org/stable/c/bbe3ff47bf09db8956bc2eeb49d2d514d256ad2a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/df349e84c2cb0dd05d98c8e1189c26ab4b116083",
          "url": "https://git.kernel.org/stable/c/df349e84c2cb0dd05d98c8e1189c26ab4b116083"
        }
      ],
      "release_date": "2025-10-07T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38198",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbcon: Make sure modelist not set on unregistered console\n\nIt looks like attempting to write to the \"store_modes\" sysfs node will\nrun afoul of unregistered consoles:\n\nUBSAN: array-index-out-of-bounds in drivers/video/fbdev/core/fbcon.c:122:28\nindex -1 is out of range for type 'fb_info *[32]'\n...\n fbcon_info_from_console+0x192/0x1a0 drivers/video/fbdev/core/fbcon.c:122\n fbcon_new_modelist+0xbf/0x2d0 drivers/video/fbdev/core/fbcon.c:3048\n fb_new_modelist+0x328/0x440 drivers/video/fbdev/core/fbmem.c:673\n store_modes+0x1c9/0x3e0 drivers/video/fbdev/core/fbsysfs.c:113\n dev_attr_store+0x55/0x80 drivers/base/core.c:2439\n\nstatic struct fb_info *fbcon_registered_fb[FB_MAX];\n...\nstatic signed char con2fb_map[MAX_NR_CONSOLES];\n...\nstatic struct fb_info *fbcon_info_from_console(int console)\n...\n        return fbcon_registered_fb[con2fb_map[console]];\n\nIf con2fb_map contains a -1 things go wrong here. Instead, return NULL,\nas callers of fbcon_info_from_console() are trying to compare against\nexisting \"info\" pointers, so error handling should kick in correctly.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38198"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/519ba75728ee8cd561dce25fc52a2ec5c47171dc",
          "url": "https://git.kernel.org/stable/c/519ba75728ee8cd561dce25fc52a2ec5c47171dc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/54b28f7c567dd659e5f9562f518e4d7f3f6a367b",
          "url": "https://git.kernel.org/stable/c/54b28f7c567dd659e5f9562f518e4d7f3f6a367b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b3237d451bf3a4490cb1a76f3b7c91d9888f1c4b",
          "url": "https://git.kernel.org/stable/c/b3237d451bf3a4490cb1a76f3b7c91d9888f1c4b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cedc1b63394a866bf8663a3e40f4546f1d28c8d8",
          "url": "https://git.kernel.org/stable/c/cedc1b63394a866bf8663a3e40f4546f1d28c8d8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f28f1f578cd810779d01999c60618cda14c281dd",
          "url": "https://git.kernel.org/stable/c/f28f1f578cd810779d01999c60618cda14c281dd"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-04T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53265",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nubi: ensure that VID header offset + VID header size <= alloc, size\n\nEnsure that the VID header offset + VID header size does not exceed\nthe allocated area to avoid slab OOB.\n\nBUG: KASAN: slab-out-of-bounds in crc32_body lib/crc32.c:111 [inline]\nBUG: KASAN: slab-out-of-bounds in crc32_le_generic lib/crc32.c:179 [inline]\nBUG: KASAN: slab-out-of-bounds in crc32_le_base+0x58c/0x626 lib/crc32.c:197\nRead of size 4 at addr ffff88802bb36f00 by task syz-executor136/1555\n\nCPU: 2 PID: 1555 Comm: syz-executor136 Tainted: G        W\n6.0.0-1868 #1\nHardware name: Red Hat KVM, BIOS 1.13.0-2.module+el8.3.0+7860+a7792d29\n04/01/2014\nCall Trace:\n  <TASK>\n  __dump_stack lib/dump_stack.c:88 [inline]\n  dump_stack_lvl+0x85/0xad lib/dump_stack.c:106\n  print_address_description mm/kasan/report.c:317 [inline]\n  print_report.cold.13+0xb6/0x6bb mm/kasan/report.c:433\n  kasan_report+0xa7/0x11b mm/kasan/report.c:495\n  crc32_body lib/crc32.c:111 [inline]\n  crc32_le_generic lib/crc32.c:179 [inline]\n  crc32_le_base+0x58c/0x626 lib/crc32.c:197\n  ubi_io_write_vid_hdr+0x1b7/0x472 drivers/mtd/ubi/io.c:1067\n  create_vtbl+0x4d5/0x9c4 drivers/mtd/ubi/vtbl.c:317\n  create_empty_lvol drivers/mtd/ubi/vtbl.c:500 [inline]\n  ubi_read_volume_table+0x67b/0x288a drivers/mtd/ubi/vtbl.c:812\n  ubi_attach+0xf34/0x1603 drivers/mtd/ubi/attach.c:1601\n  ubi_attach_mtd_dev+0x6f3/0x185e drivers/mtd/ubi/build.c:965\n  ctrl_cdev_ioctl+0x2db/0x347 drivers/mtd/ubi/cdev.c:1043\n  vfs_ioctl fs/ioctl.c:51 [inline]\n  __do_sys_ioctl fs/ioctl.c:870 [inline]\n  __se_sys_ioctl fs/ioctl.c:856 [inline]\n  __x64_sys_ioctl+0x193/0x213 fs/ioctl.c:856\n  do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n  do_syscall_64+0x3e/0x86 arch/x86/entry/common.c:80\n  entry_SYSCALL_64_after_hwframe+0x63/0x0\nRIP: 0033:0x7f96d5cf753d\nCode:\nRSP: 002b:00007fffd72206f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f96d5cf753d\nRDX: 0000000020000080 RSI: 0000000040186f40 RDI: 0000000000000003\nRBP: 0000000000400cd0 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000400be0\nR13: 00007fffd72207e0 R14: 0000000000000000 R15: 0000000000000000\n  </TASK>\n\nAllocated by task 1555:\n  kasan_save_stack+0x20/0x3d mm/kasan/common.c:38\n  kasan_set_track mm/kasan/common.c:45 [inline]\n  set_alloc_info mm/kasan/common.c:437 [inline]\n  ____kasan_kmalloc mm/kasan/common.c:516 [inline]\n  __kasan_kmalloc+0x88/0xa3 mm/kasan/common.c:525\n  kasan_kmalloc include/linux/kasan.h:234 [inline]\n  __kmalloc+0x138/0x257 mm/slub.c:4429\n  kmalloc include/linux/slab.h:605 [inline]\n  ubi_alloc_vid_buf drivers/mtd/ubi/ubi.h:1093 [inline]\n  create_vtbl+0xcc/0x9c4 drivers/mtd/ubi/vtbl.c:295\n  create_empty_lvol drivers/mtd/ubi/vtbl.c:500 [inline]\n  ubi_read_volume_table+0x67b/0x288a drivers/mtd/ubi/vtbl.c:812\n  ubi_attach+0xf34/0x1603 drivers/mtd/ubi/attach.c:1601\n  ubi_attach_mtd_dev+0x6f3/0x185e drivers/mtd/ubi/build.c:965\n  ctrl_cdev_ioctl+0x2db/0x347 drivers/mtd/ubi/cdev.c:1043\n  vfs_ioctl fs/ioctl.c:51 [inline]\n  __do_sys_ioctl fs/ioctl.c:870 [inline]\n  __se_sys_ioctl fs/ioctl.c:856 [inline]\n  __x64_sys_ioctl+0x193/0x213 fs/ioctl.c:856\n  do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n  do_syscall_64+0x3e/0x86 arch/x86/entry/common.c:80\n  entry_SYSCALL_64_after_hwframe+0x63/0x0\n\nThe buggy address belongs to the object at ffff88802bb36e00\n  which belongs to the cache kmalloc-256 of size 256\nThe buggy address is located 0 bytes to the right of\n  256-byte region [ffff88802bb36e00, ffff88802bb36f00)\n\nThe buggy address belongs to the physical page:\npage:00000000ea4d1263 refcount:1 mapcount:0 mapping:0000000000000000\nindex:0x0 pfn:0x2bb36\nhead:00000000ea4d1263 order:1 compound_mapcount:0 compound_pincount:0\nflags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff)\nraw: 000fffffc0010200 ffffea000066c300 dead000000000003 ffff888100042b40\nraw: 0000000000000000 00000000001\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53265"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1b42b1a36fc946f0d7088425b90d491b4257ca3e",
          "url": "https://git.kernel.org/stable/c/1b42b1a36fc946f0d7088425b90d491b4257ca3e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/61aeba0e4b4124cfe3c5427feaf29c626dfa89e5",
          "url": "https://git.kernel.org/stable/c/61aeba0e4b4124cfe3c5427feaf29c626dfa89e5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/61e04db3bec87f7dd10074296deb7d083e2ccade",
          "url": "https://git.kernel.org/stable/c/61e04db3bec87f7dd10074296deb7d083e2ccade"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/701bb3ed5a88a73ebbe1266895bdeff065226dca",
          "url": "https://git.kernel.org/stable/c/701bb3ed5a88a73ebbe1266895bdeff065226dca"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/771e207a839a29ba943e89f473b0fecd16089e2e",
          "url": "https://git.kernel.org/stable/c/771e207a839a29ba943e89f473b0fecd16089e2e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/846bfba34175c23b13cc2023c2d67b96e8c14c43",
          "url": "https://git.kernel.org/stable/c/846bfba34175c23b13cc2023c2d67b96e8c14c43"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e1b73fe4f4c6bb80755eb4bf4b867a8fd8b1a7fe",
          "url": "https://git.kernel.org/stable/c/e1b73fe4f4c6bb80755eb4bf4b867a8fd8b1a7fe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f7adb740f97b6fa84e658892dcb08e37a31a4e77",
          "url": "https://git.kernel.org/stable/c/f7adb740f97b6fa84e658892dcb08e37a31a4e77"
        }
      ],
      "release_date": "2025-09-16T08:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53668",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nring-buffer: Fix deadloop issue on reading trace_pipe\n\nSoft lockup occurs when reading file 'trace_pipe':\n\n  watchdog: BUG: soft lockup - CPU#6 stuck for 22s! [cat:4488]\n  [...]\n  RIP: 0010:ring_buffer_empty_cpu+0xed/0x170\n  RSP: 0018:ffff88810dd6fc48 EFLAGS: 00000246\n  RAX: 0000000000000000 RBX: 0000000000000246 RCX: ffffffff93d1aaeb\n  RDX: ffff88810a280040 RSI: 0000000000000008 RDI: ffff88811164b218\n  RBP: ffff88811164b218 R08: 0000000000000000 R09: ffff88815156600f\n  R10: ffffed102a2acc01 R11: 0000000000000001 R12: 0000000051651901\n  R13: 0000000000000000 R14: ffff888115e49500 R15: 0000000000000000\n  [...]\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 00007f8d853c2000 CR3: 000000010dcd8000 CR4: 00000000000006e0\n  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n  Call Trace:\n   __find_next_entry+0x1a8/0x4b0\n   ? peek_next_entry+0x250/0x250\n   ? down_write+0xa5/0x120\n   ? down_write_killable+0x130/0x130\n   trace_find_next_entry_inc+0x3b/0x1d0\n   tracing_read_pipe+0x423/0xae0\n   ? tracing_splice_read_pipe+0xcb0/0xcb0\n   vfs_read+0x16b/0x490\n   ksys_read+0x105/0x210\n   ? __ia32_sys_pwrite64+0x200/0x200\n   ? switch_fpu_return+0x108/0x220\n   do_syscall_64+0x33/0x40\n   entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThrough the vmcore, I found it's because in tracing_read_pipe(),\nring_buffer_empty_cpu() found some buffer is not empty but then it\ncannot read anything due to \"rb_num_of_entries() == 0\" always true,\nThen it infinitely loop the procedure due to user buffer not been\nfilled, see following code path:\n\n  tracing_read_pipe() {\n    ... ...\n    waitagain:\n      tracing_wait_pipe() // 1. find non-empty buffer here\n      trace_find_next_entry_inc()  // 2. loop here try to find an entry\n        __find_next_entry()\n          ring_buffer_empty_cpu();  // 3. find non-empty buffer\n          peek_next_entry()  // 4. but peek always return NULL\n            ring_buffer_peek()\n              rb_buffer_peek()\n                rb_get_reader_page()\n                  // 5. because rb_num_of_entries() == 0 always true here\n                  //    then return NULL\n      // 6. user buffer not been filled so goto 'waitgain'\n      //    and eventually leads to an deadloop in kernel!!!\n  }\n\nBy some analyzing, I found that when resetting ringbuffer, the 'entries'\nof its pages are not all cleared (see rb_reset_cpu()). Then when reducing\nthe ringbuffer, and if some reduced pages exist dirty 'entries' data, they\nwill be added into 'cpu_buffer->overrun' (see rb_remove_pages()), which\ncause wrong 'overrun' count and eventually cause the deadloop issue.\n\nTo fix it, we need to clear every pages in rb_reset_cpu().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53668"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0a29dae5786d263016a9aceb1e56bf3fd4cc6fa0",
          "url": "https://git.kernel.org/stable/c/0a29dae5786d263016a9aceb1e56bf3fd4cc6fa0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/27bdd93e44cc28dd9b94893fae146b83d4f5b31e",
          "url": "https://git.kernel.org/stable/c/27bdd93e44cc28dd9b94893fae146b83d4f5b31e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5e68f1f3a20fe9b6bde018e353269fbfa289609c",
          "url": "https://git.kernel.org/stable/c/5e68f1f3a20fe9b6bde018e353269fbfa289609c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7e42907f3a7b4ce3a2d1757f6d78336984daf8f5",
          "url": "https://git.kernel.org/stable/c/7e42907f3a7b4ce3a2d1757f6d78336984daf8f5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8b0b63fdac6b70a45614e7d4b30e5bbb93deb007",
          "url": "https://git.kernel.org/stable/c/8b0b63fdac6b70a45614e7d4b30e5bbb93deb007"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a55e8a3596048c2f7b574049aeb1885b5abba1cc",
          "url": "https://git.kernel.org/stable/c/a55e8a3596048c2f7b574049aeb1885b5abba1cc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bb14a93bccc92766b1d9302c6bcbea17d4bce306",
          "url": "https://git.kernel.org/stable/c/bb14a93bccc92766b1d9302c6bcbea17d4bce306"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e84829522fc72bb43556b31575731de0440ac0dd",
          "url": "https://git.kernel.org/stable/c/e84829522fc72bb43556b31575731de0440ac0dd"
        }
      ],
      "release_date": "2025-10-07T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53259",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nVMCI: check context->notify_page after call to get_user_pages_fast() to avoid GPF\n\nThe call to get_user_pages_fast() in vmci_host_setup_notify() can return\nNULL context->notify_page causing a GPF. To avoid GPF check if\ncontext->notify_page == NULL and return error if so.\n\ngeneral protection fault, probably for non-canonical address\n    0xe0009d1000000060: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0x0005088000000300-\n    0x0005088000000307]\nCPU: 2 PID: 26180 Comm: repro_34802241 Not tainted 6.1.0-rc4 #1\nHardware name: Red Hat KVM, BIOS 1.15.0-2.module+el8.6.0 04/01/2014\nRIP: 0010:vmci_ctx_check_signal_notify+0x91/0xe0\nCall Trace:\n <TASK>\n vmci_host_unlocked_ioctl+0x362/0x1f40\n __x64_sys_ioctl+0x1a1/0x230\n do_syscall_64+0x3a/0x90\n entry_SYSCALL_64_after_hwframe+0x63/0xcd",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53259"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/055891397f530f9b1b22be38d7eca8b08382941f",
          "url": "https://git.kernel.org/stable/c/055891397f530f9b1b22be38d7eca8b08382941f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1a726cb47fd204109c767409fa9ca15a96328f14",
          "url": "https://git.kernel.org/stable/c/1a726cb47fd204109c767409fa9ca15a96328f14"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/91b8e4f61f8f4594ee65368c8d89e6fdc29d3fb1",
          "url": "https://git.kernel.org/stable/c/91b8e4f61f8f4594ee65368c8d89e6fdc29d3fb1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a3c89e8c69a58f62451c0a75b77fcab25979b897",
          "url": "https://git.kernel.org/stable/c/a3c89e8c69a58f62451c0a75b77fcab25979b897"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b4239bfb260d1e6837766c41a0b241d7670f1402",
          "url": "https://git.kernel.org/stable/c/b4239bfb260d1e6837766c41a0b241d7670f1402"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d4198f67e7556b1507f14f60d81a72660e5560e4",
          "url": "https://git.kernel.org/stable/c/d4198f67e7556b1507f14f60d81a72660e5560e4"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        }
      ],
      "release_date": "2025-09-15T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38685",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: Fix vmalloc out-of-bounds write in fast_imageblit\n\nThis issue triggers when a userspace program does an ioctl\nFBIOPUT_CON2FBMAP by passing console number and frame buffer number.\nIdeally this maps console to frame buffer and updates the screen if\nconsole is visible.\n\nAs part of mapping it has to do resize of console according to frame\nbuffer info. if this resize fails and returns from vc_do_resize() and\ncontinues further. At this point console and new frame buffer are mapped\nand sets display vars. Despite failure still it continue to proceed\nupdating the screen at later stages where vc_data is related to previous\nframe buffer and frame buffer info and display vars are mapped to new\nframe buffer and eventully leading to out-of-bounds write in\nfast_imageblit(). This bheviour is excepted only when fg_console is\nequal to requested console which is a visible console and updates screen\nwith invalid struct references in fbcon_putcs().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38685"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/078e62bffca4b7e72e8f3550eb063ab981c36c7a",
          "url": "https://git.kernel.org/stable/c/078e62bffca4b7e72e8f3550eb063ab981c36c7a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/27b118aebdd84161c8ff5ce49d9d536f2af10754",
          "url": "https://git.kernel.org/stable/c/27b118aebdd84161c8ff5ce49d9d536f2af10754"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4c4d7ddaf1d43780b106bedc692679f965dc5a3a",
          "url": "https://git.kernel.org/stable/c/4c4d7ddaf1d43780b106bedc692679f965dc5a3a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/56701bf9eeb63219e378cb7fcbd066ea4eaeeb50",
          "url": "https://git.kernel.org/stable/c/56701bf9eeb63219e378cb7fcbd066ea4eaeeb50"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/af0db3c1f898144846d4c172531a199bb3ca375d",
          "url": "https://git.kernel.org/stable/c/af0db3c1f898144846d4c172531a199bb3ca375d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cfec17721265e72e50cc69c6004fe3475cd38df2",
          "url": "https://git.kernel.org/stable/c/cfec17721265e72e50cc69c6004fe3475cd38df2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ed9b8e5016230868c8d813d9179523f729fec8c6",
          "url": "https://git.kernel.org/stable/c/ed9b8e5016230868c8d813d9179523f729fec8c6"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38714",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: fix slab-out-of-bounds in hfsplus_bnode_read()\n\nThe hfsplus_bnode_read() method can trigger the issue:\n\n[  174.852007][ T9784] ==================================================================\n[  174.852709][ T9784] BUG: KASAN: slab-out-of-bounds in hfsplus_bnode_read+0x2f4/0x360\n[  174.853412][ T9784] Read of size 8 at addr ffff88810b5fc6c0 by task repro/9784\n[  174.854059][ T9784]\n[  174.854272][ T9784] CPU: 1 UID: 0 PID: 9784 Comm: repro Not tainted 6.16.0-rc3 #7 PREEMPT(full)\n[  174.854281][ T9784] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n[  174.854286][ T9784] Call Trace:\n[  174.854289][ T9784]  <TASK>\n[  174.854292][ T9784]  dump_stack_lvl+0x10e/0x1f0\n[  174.854305][ T9784]  print_report+0xd0/0x660\n[  174.854315][ T9784]  ? __virt_addr_valid+0x81/0x610\n[  174.854323][ T9784]  ? __phys_addr+0xe8/0x180\n[  174.854330][ T9784]  ? hfsplus_bnode_read+0x2f4/0x360\n[  174.854337][ T9784]  kasan_report+0xc6/0x100\n[  174.854346][ T9784]  ? hfsplus_bnode_read+0x2f4/0x360\n[  174.854354][ T9784]  hfsplus_bnode_read+0x2f4/0x360\n[  174.854362][ T9784]  hfsplus_bnode_dump+0x2ec/0x380\n[  174.854370][ T9784]  ? __pfx_hfsplus_bnode_dump+0x10/0x10\n[  174.854377][ T9784]  ? hfsplus_bnode_write_u16+0x83/0xb0\n[  174.854385][ T9784]  ? srcu_gp_start+0xd0/0x310\n[  174.854393][ T9784]  ? __mark_inode_dirty+0x29e/0xe40\n[  174.854402][ T9784]  hfsplus_brec_remove+0x3d2/0x4e0\n[  174.854411][ T9784]  __hfsplus_delete_attr+0x290/0x3a0\n[  174.854419][ T9784]  ? __pfx_hfs_find_1st_rec_by_cnid+0x10/0x10\n[  174.854427][ T9784]  ? __pfx___hfsplus_delete_attr+0x10/0x10\n[  174.854436][ T9784]  ? __asan_memset+0x23/0x50\n[  174.854450][ T9784]  hfsplus_delete_all_attrs+0x262/0x320\n[  174.854459][ T9784]  ? __pfx_hfsplus_delete_all_attrs+0x10/0x10\n[  174.854469][ T9784]  ? rcu_is_watching+0x12/0xc0\n[  174.854476][ T9784]  ? __mark_inode_dirty+0x29e/0xe40\n[  174.854483][ T9784]  hfsplus_delete_cat+0x845/0xde0\n[  174.854493][ T9784]  ? __pfx_hfsplus_delete_cat+0x10/0x10\n[  174.854507][ T9784]  hfsplus_unlink+0x1ca/0x7c0\n[  174.854516][ T9784]  ? __pfx_hfsplus_unlink+0x10/0x10\n[  174.854525][ T9784]  ? down_write+0x148/0x200\n[  174.854532][ T9784]  ? __pfx_down_write+0x10/0x10\n[  174.854540][ T9784]  vfs_unlink+0x2fe/0x9b0\n[  174.854549][ T9784]  do_unlinkat+0x490/0x670\n[  174.854557][ T9784]  ? __pfx_do_unlinkat+0x10/0x10\n[  174.854565][ T9784]  ? __might_fault+0xbc/0x130\n[  174.854576][ T9784]  ? getname_flags.part.0+0x1c5/0x550\n[  174.854584][ T9784]  __x64_sys_unlink+0xc5/0x110\n[  174.854592][ T9784]  do_syscall_64+0xc9/0x480\n[  174.854600][ T9784]  entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[  174.854608][ T9784] RIP: 0033:0x7f6fdf4c3167\n[  174.854614][ T9784] Code: f0 ff ff 73 01 c3 48 8b 0d 26 0d 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 08\n[  174.854622][ T9784] RSP: 002b:00007ffcb948bca8 EFLAGS: 00000206 ORIG_RAX: 0000000000000057\n[  174.854630][ T9784] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6fdf4c3167\n[  174.854636][ T9784] RDX: 00007ffcb948bcc0 RSI: 00007ffcb948bcc0 RDI: 00007ffcb948bd50\n[  174.854641][ T9784] RBP: 00007ffcb948cd90 R08: 0000000000000001 R09: 00007ffcb948bb40\n[  174.854645][ T9784] R10: 00007f6fdf564fc0 R11: 0000000000000206 R12: 0000561e1bc9c2d0\n[  174.854650][ T9784] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[  174.854658][ T9784]  </TASK>\n[  174.854661][ T9784]\n[  174.879281][ T9784] Allocated by task 9784:\n[  174.879664][ T9784]  kasan_save_stack+0x20/0x40\n[  174.880082][ T9784]  kasan_save_track+0x14/0x30\n[  174.880500][ T9784]  __kasan_kmalloc+0xaa/0xb0\n[  174.880908][ T9784]  __kmalloc_noprof+0x205/0x550\n[  174.881337][ T9784]  __hfs_bnode_create+0x107/0x890\n[  174.881779][ T9784]  hfsplus_bnode_find+0x2d0/0xd10\n[  174.882222][ T9784]  hfsplus_brec_find+0x2b0/0x520\n[  174.882659][ T9784]  hfsplus_delete_all_attrs+0x23b/0x3\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38714"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/032f7ed6717a4cd3714f9801be39fdfc7f1c7644",
          "url": "https://git.kernel.org/stable/c/032f7ed6717a4cd3714f9801be39fdfc7f1c7644"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/291b7f2538920aa229500dbdd6c5f0927a51bc8b",
          "url": "https://git.kernel.org/stable/c/291b7f2538920aa229500dbdd6c5f0927a51bc8b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/475d770c19929082aab43337e6c077d0e2043df3",
          "url": "https://git.kernel.org/stable/c/475d770c19929082aab43337e6c077d0e2043df3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5ab59229bef6063edf3a6fc2e3e3fd7cd2181b29",
          "url": "https://git.kernel.org/stable/c/5ab59229bef6063edf3a6fc2e3e3fd7cd2181b29"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7fa4cef8ea13b37811287ef60674c5fd1dd02ee6",
          "url": "https://git.kernel.org/stable/c/7fa4cef8ea13b37811287ef60674c5fd1dd02ee6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8583d067ae22b7f32ce5277ca5543ac8bf86a3e5",
          "url": "https://git.kernel.org/stable/c/8583d067ae22b7f32ce5277ca5543ac8bf86a3e5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a2abd574d2fe22b8464cf6df5abb6f24d809eac0",
          "url": "https://git.kernel.org/stable/c/a2abd574d2fe22b8464cf6df5abb6f24d809eac0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c80aa2aaaa5e69d5219c6af8ef7e754114bd08d2",
          "url": "https://git.kernel.org/stable/c/c80aa2aaaa5e69d5219c6af8ef7e754114bd08d2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ffee8a7bed0fbfe29da239a922b59c5db897c613",
          "url": "https://git.kernel.org/stable/c/ffee8a7bed0fbfe29da239a922b59c5db897c613"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53305",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix use-after-free\n\nFix potential use-after-free in l2cap_le_command_rej.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53305"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/149daab45922ab1ac7f0cbeacab7251a46bf5e63",
          "url": "https://git.kernel.org/stable/c/149daab45922ab1ac7f0cbeacab7251a46bf5e63"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1a40c56e8bff3e424724d78a9a6b3272dd8a371d",
          "url": "https://git.kernel.org/stable/c/1a40c56e8bff3e424724d78a9a6b3272dd8a371d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/255be68150291440657b2cdb09420b69441af3d8",
          "url": "https://git.kernel.org/stable/c/255be68150291440657b2cdb09420b69441af3d8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2958cf9f805b9f0bdc4a761bf6ea281eb8d44f8e",
          "url": "https://git.kernel.org/stable/c/2958cf9f805b9f0bdc4a761bf6ea281eb8d44f8e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/548a6b64b3c0688f01119a6fcccceb41f8c984e4",
          "url": "https://git.kernel.org/stable/c/548a6b64b3c0688f01119a6fcccceb41f8c984e4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e76bab1b7afa580cd76362540fc37551ada4359b",
          "url": "https://git.kernel.org/stable/c/e76bab1b7afa580cd76362540fc37551ada4359b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f752a0b334bb95fe9b42ecb511e0864e2768046f",
          "url": "https://git.kernel.org/stable/c/f752a0b334bb95fe9b42ecb511e0864e2768046f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fe49aa73cca6608714477b74bfc6874b9db979df",
          "url": "https://git.kernel.org/stable/c/fe49aa73cca6608714477b74bfc6874b9db979df"
        }
      ],
      "release_date": "2025-09-16T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53307",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrbd: avoid use-after-free in do_rbd_add() when rbd_dev_create() fails\n\nIf getting an ID or setting up a work queue in rbd_dev_create() fails,\nuse-after-free on rbd_dev->rbd_client, rbd_dev->spec and rbd_dev->opts\nis triggered in do_rbd_add().  The root cause is that the ownership of\nthese structures is transfered to rbd_dev prematurely and they all end\nup getting freed when rbd_dev_create() calls rbd_dev_free() prior to\nreturning to do_rbd_add().\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE, an\nincomplete patch submitted by Natalia Petrova <n.petrova@fintech.ru>.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53307"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/71da2a151ed1adb0aea4252b16d81b53012e7afd",
          "url": "https://git.kernel.org/stable/c/71da2a151ed1adb0aea4252b16d81b53012e7afd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9787b328c42c13c4f31e7d5042c4e877e9344068",
          "url": "https://git.kernel.org/stable/c/9787b328c42c13c4f31e7d5042c4e877e9344068"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a73783e4e0c4d1507794da211eeca75498544dff",
          "url": "https://git.kernel.org/stable/c/a73783e4e0c4d1507794da211eeca75498544dff"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ae16346078b1189aee934afd872d9f3d0a682c33",
          "url": "https://git.kernel.org/stable/c/ae16346078b1189aee934afd872d9f3d0a682c33"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cc8c0dd2984503ed09efa37bcafcef3d3da104e8",
          "url": "https://git.kernel.org/stable/c/cc8c0dd2984503ed09efa37bcafcef3d3da104e8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e3cbb4d60764295992c95344f2d779439e8b34ce",
          "url": "https://git.kernel.org/stable/c/e3cbb4d60764295992c95344f2d779439e8b34ce"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f7c4d9b133c7a04ca619355574e96b6abf209fba",
          "url": "https://git.kernel.org/stable/c/f7c4d9b133c7a04ca619355574e96b6abf209fba"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/faa7b683e436664fff5648426950718277831348",
          "url": "https://git.kernel.org/stable/c/faa7b683e436664fff5648426950718277831348"
        }
      ],
      "release_date": "2025-09-16T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38375",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-net: ensure the received length does not exceed allocated size\n\nIn xdp_linearize_page, when reading the following buffers from the ring,\nwe forget to check the received length with the true allocate size. This\ncan lead to an out-of-bound read. This commit adds that missing check.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38375"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/11f2d0e8be2b5e784ac45fa3da226492c3e506d8",
          "url": "https://git.kernel.org/stable/c/11f2d0e8be2b5e784ac45fa3da226492c3e506d8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/315dbdd7cdf6aa533829774caaf4d25f1fd20e73",
          "url": "https://git.kernel.org/stable/c/315dbdd7cdf6aa533829774caaf4d25f1fd20e73"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6aca3dad2145e864dfe4d1060f45eb1bac75dd58",
          "url": "https://git.kernel.org/stable/c/6aca3dad2145e864dfe4d1060f45eb1bac75dd58"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/773e95c268b5d859f51f7547559734fd2a57660c",
          "url": "https://git.kernel.org/stable/c/773e95c268b5d859f51f7547559734fd2a57660c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/80b971be4c37a4d23a7f1abc5ff33dc7733d649b",
          "url": "https://git.kernel.org/stable/c/80b971be4c37a4d23a7f1abc5ff33dc7733d649b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/982beb7582c193544eb9c6083937ec5ac1c9d651",
          "url": "https://git.kernel.org/stable/c/982beb7582c193544eb9c6083937ec5ac1c9d651"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bc68bc3563344ccdc57d1961457cdeecab8f81ef",
          "url": "https://git.kernel.org/stable/c/bc68bc3563344ccdc57d1961457cdeecab8f81ef"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ddc8649d363141fb3371dd81a73e1cb4ef8ed1e1",
          "url": "https://git.kernel.org/stable/c/ddc8649d363141fb3371dd81a73e1cb4ef8ed1e1"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-25T13:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38250",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_core: Fix use-after-free in vhci_flush()\n\nsyzbot reported use-after-free in vhci_flush() without repro. [0]\n\nFrom the splat, a thread close()d a vhci file descriptor while\nits device was being used by iotcl() on another thread.\n\nOnce the last fd refcnt is released, vhci_release() calls\nhci_unregister_dev(), hci_free_dev(), and kfree() for struct\nvhci_data, which is set to hci_dev->dev->driver_data.\n\nThe problem is that there is no synchronisation after unlinking\nhdev from hci_dev_list in hci_unregister_dev().  There might be\nanother thread still accessing the hdev which was fetched before\nthe unlink operation.\n\nWe can use SRCU for such synchronisation.\n\nLet's run hci_dev_reset() under SRCU and wait for its completion\nin hci_unregister_dev().\n\nAnother option would be to restore hci_dev->destruct(), which was\nremoved in commit 587ae086f6e4 (\"Bluetooth: Remove unused\nhci-destruct cb\").  However, this would not be a good solution, as\nwe should not run hci_unregister_dev() while there are in-flight\nioctl() requests, which could lead to another data-race KCSAN splat.\n\nNote that other drivers seem to have the same problem, for exmaple,\nvirtbt_remove().\n\n[0]:\nBUG: KASAN: slab-use-after-free in skb_queue_empty_lockless include/linux/skbuff.h:1891 [inline]\nBUG: KASAN: slab-use-after-free in skb_queue_purge_reason+0x99/0x360 net/core/skbuff.c:3937\nRead of size 8 at addr ffff88807cb8d858 by task syz.1.219/6718\n\nCPU: 1 UID: 0 PID: 6718 Comm: syz.1.219 Not tainted 6.16.0-rc1-syzkaller-00196-g08207f42d3ff #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025\nCall Trace:\n <TASK>\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:408 [inline]\n print_report+0xd2/0x2b0 mm/kasan/report.c:521\n kasan_report+0x118/0x150 mm/kasan/report.c:634\n skb_queue_empty_lockless include/linux/skbuff.h:1891 [inline]\n skb_queue_purge_reason+0x99/0x360 net/core/skbuff.c:3937\n skb_queue_purge include/linux/skbuff.h:3368 [inline]\n vhci_flush+0x44/0x50 drivers/bluetooth/hci_vhci.c:69\n hci_dev_do_reset net/bluetooth/hci_core.c:552 [inline]\n hci_dev_reset+0x420/0x5c0 net/bluetooth/hci_core.c:592\n sock_do_ioctl+0xd9/0x300 net/socket.c:1190\n sock_ioctl+0x576/0x790 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:907 [inline]\n __se_sys_ioctl+0xf9/0x170 fs/ioctl.c:893\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fcf5b98e929\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fcf5c7b9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 00007fcf5bbb6160 RCX: 00007fcf5b98e929\nRDX: 0000000000000000 RSI: 00000000400448cb RDI: 0000000000000009\nRBP: 00007fcf5ba10b39 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 0000000000000000 R14: 00007fcf5bbb6160 R15: 00007ffd6353d528\n </TASK>\n\nAllocated by task 6535:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3e/0x80 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4359\n kmalloc_noprof include/linux/slab.h:905 [inline]\n kzalloc_noprof include/linux/slab.h:1039 [inline]\n vhci_open+0x57/0x360 drivers/bluetooth/hci_vhci.c:635\n misc_open+0x2bc/0x330 drivers/char/misc.c:161\n chrdev_open+0x4c9/0x5e0 fs/char_dev.c:414\n do_dentry_open+0xdf0/0x1970 fs/open.c:964\n vfs_open+0x3b/0x340 fs/open.c:1094\n do_open fs/namei.c:3887 [inline]\n path_openat+0x2ee5/0x3830 fs/name\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38250"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0e5c144c557df910ab64d9c25d06399a9a735e65",
          "url": "https://git.kernel.org/stable/c/0e5c144c557df910ab64d9c25d06399a9a735e65"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1d6123102e9fbedc8d25bf4731da6d513173e49e",
          "url": "https://git.kernel.org/stable/c/1d6123102e9fbedc8d25bf4731da6d513173e49e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bc0819a25e04cd68ef3568cfa51b63118fea39a7",
          "url": "https://git.kernel.org/stable/c/bc0819a25e04cd68ef3568cfa51b63118fea39a7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ce23b73f0f27e2dbeb81734a79db710f05aa33c6",
          "url": "https://git.kernel.org/stable/c/ce23b73f0f27e2dbeb81734a79db710f05aa33c6"
        }
      ],
      "release_date": "2025-07-09T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-21546",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: Fix WRITE_SAME No Data Buffer crash\n\nIn newer version of the SBC specs, we have a NDOB bit that indicates there\nis no data buffer that gets written out. If this bit is set using commands\nlike \"sg_write_same --ndob\" we will crash in target_core_iblock/file's\nexecute_write_same handlers when we go to access the se_cmd->t_data_sg\nbecause its NULL.\n\nThis patch adds a check for the NDOB bit in the common WRITE SAME code\nbecause we don't support it. And, it adds a check for zero SG elements in\neach handler in case the initiator tries to send a normal WRITE SAME with\nno data buffer.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-21546"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4226622647e3e5ac06d3ebc1605b917446157510",
          "url": "https://git.kernel.org/stable/c/4226622647e3e5ac06d3ebc1605b917446157510"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/54e57be2573cf0b8bf650375fd8752987b6c3d3b",
          "url": "https://git.kernel.org/stable/c/54e57be2573cf0b8bf650375fd8752987b6c3d3b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ccd3f449052449a917a3e577d8ba0368f43b8f29",
          "url": "https://git.kernel.org/stable/c/ccd3f449052449a917a3e577d8ba0368f43b8f29"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d8e6a27e9238dd294d6f2f401655f300dca20899",
          "url": "https://git.kernel.org/stable/c/d8e6a27e9238dd294d6f2f401655f300dca20899"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        }
      ],
      "release_date": "2025-05-02T22:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38556",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: core: Harden s32ton() against conversion to 0 bits\n\nTesting by the syzbot fuzzer showed that the HID core gets a\nshift-out-of-bounds exception when it tries to convert a 32-bit\nquantity to a 0-bit quantity.  Ideally this should never occur, but\nthere are buggy devices and some might have a report field with size\nset to zero; we shouldn't reject the report or the device just because\nof that.\n\nInstead, harden the s32ton() routine so that it returns a reasonable\nresult instead of crashing when it is called with the number of bits\nset to 0 -- the same as what snto32() does.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38556"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3c86548a20d7bc2861aa4de044991a327bebad1a",
          "url": "https://git.kernel.org/stable/c/3c86548a20d7bc2861aa4de044991a327bebad1a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6cdf6c708717c5c6897d0800a1793e83757c7491",
          "url": "https://git.kernel.org/stable/c/6cdf6c708717c5c6897d0800a1793e83757c7491"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/810189546cb6c8f36443ed091d91f1f5d2fc2ec7",
          "url": "https://git.kernel.org/stable/c/810189546cb6c8f36443ed091d91f1f5d2fc2ec7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/865ad8469fa24de1559f247d9426ab01e5ce3a56",
          "url": "https://git.kernel.org/stable/c/865ad8469fa24de1559f247d9426ab01e5ce3a56"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8b4a94b1510f6a46ec48494b52ee8f67eb4fc836",
          "url": "https://git.kernel.org/stable/c/8b4a94b1510f6a46ec48494b52ee8f67eb4fc836"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a6b87bfc2ab5bccb7ad953693c85d9062aef3fdd",
          "url": "https://git.kernel.org/stable/c/a6b87bfc2ab5bccb7ad953693c85d9062aef3fdd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d3b504146c111548ab60b6ef7aad00bfb1db05a2",
          "url": "https://git.kernel.org/stable/c/d3b504146c111548ab60b6ef7aad00bfb1db05a2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/eeeaba737919bdce9885e2a00ac2912f61a3684d",
          "url": "https://git.kernel.org/stable/c/eeeaba737919bdce9885e2a00ac2912f61a3684d"
        }
      ],
      "release_date": "2025-08-19T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53541",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: rawnand: brcmnand: Fix potential out-of-bounds access in oob write\n\nWhen the oob buffer length is not in multiple of words, the oob write\nfunction does out-of-bounds read on the oob source buffer at the last\niteration. Fix that by always checking length limit on the oob buffer\nread and fill with 0xff when reaching the end of the buffer to the oob\nregisters.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53541"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/14b1d00520b4d6a4818364334ce472b79cfc8976",
          "url": "https://git.kernel.org/stable/c/14b1d00520b4d6a4818364334ce472b79cfc8976"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2353b7bb61e45e7cfd21505d0c6747ac8c9496a1",
          "url": "https://git.kernel.org/stable/c/2353b7bb61e45e7cfd21505d0c6747ac8c9496a1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2bc3d6ac704ea7263175ea3da663fdbbb7f3dd8b",
          "url": "https://git.kernel.org/stable/c/2bc3d6ac704ea7263175ea3da663fdbbb7f3dd8b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/45fe4ad7f439799ee1b7b5f80bf82e8b34a98d25",
          "url": "https://git.kernel.org/stable/c/45fe4ad7f439799ee1b7b5f80bf82e8b34a98d25"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5d53244186c9ac58cb88d76a0958ca55b83a15cd",
          "url": "https://git.kernel.org/stable/c/5d53244186c9ac58cb88d76a0958ca55b83a15cd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/648d1150a688698e37f7aaf302860180901cb30e",
          "url": "https://git.kernel.org/stable/c/648d1150a688698e37f7aaf302860180901cb30e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/aae45746f4aee9818296e0500e0703e9d8caa5b8",
          "url": "https://git.kernel.org/stable/c/aae45746f4aee9818296e0500e0703e9d8caa5b8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d00b031266514a9395124704630b056a5185ec17",
          "url": "https://git.kernel.org/stable/c/d00b031266514a9395124704630b056a5185ec17"
        }
      ],
      "release_date": "2025-10-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39760",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: core: config: Prevent OOB read in SS endpoint companion parsing\n\nusb_parse_ss_endpoint_companion() checks descriptor type before length,\nenabling a potentially odd read outside of the buffer size.\n\nFix this up by checking the size first before looking at any of the\nfields in the descriptor.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39760"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/058ad2b722812708fe90567875704ae36563e33b",
          "url": "https://git.kernel.org/stable/c/058ad2b722812708fe90567875704ae36563e33b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4fe6f472f0beef4281e6f03bc38a910a33be663f",
          "url": "https://git.kernel.org/stable/c/4fe6f472f0beef4281e6f03bc38a910a33be663f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5badd56c711e2c8371d1670f9bd486697575423c",
          "url": "https://git.kernel.org/stable/c/5badd56c711e2c8371d1670f9bd486697575423c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5c3097ede7835d3caf6543eb70ff689af4550cd2",
          "url": "https://git.kernel.org/stable/c/5c3097ede7835d3caf6543eb70ff689af4550cd2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9512510cee7d1becdb0e9413fdd3ab783e4e30ee",
          "url": "https://git.kernel.org/stable/c/9512510cee7d1becdb0e9413fdd3ab783e4e30ee"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9843bcb187cb933861f7805022e6873905f669e4",
          "url": "https://git.kernel.org/stable/c/9843bcb187cb933861f7805022e6873905f669e4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b10e0f868067c6f25bbfabdcf3e1e6432c24ca55",
          "url": "https://git.kernel.org/stable/c/b10e0f868067c6f25bbfabdcf3e1e6432c24ca55"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cf16f408364efd8a68f39011a3b073c83a03612d",
          "url": "https://git.kernel.org/stable/c/cf16f408364efd8a68f39011a3b073c83a03612d"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-11T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53506",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nudf: Do not bother merging very long extents\n\nWhen merging very long extents we try to push as much length as possible\nto the first extent. However this is unnecessarily complicated and not\nreally worth the trouble. Furthermore there was a bug in the logic\nresulting in corrupting extents in the file as syzbot reproducer shows.\nSo just don't bother with the merging of extents that are too long\ntogether.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53506"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3d20e3b768aff32112bdce8d3219d923ae75f9f1",
          "url": "https://git.kernel.org/stable/c/3d20e3b768aff32112bdce8d3219d923ae75f9f1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/53cafe1d6d8ef9f93318e5bfccc0d24f27d41ced",
          "url": "https://git.kernel.org/stable/c/53cafe1d6d8ef9f93318e5bfccc0d24f27d41ced"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5d029799d381a9ee06209a222cae75f04c5d5304",
          "url": "https://git.kernel.org/stable/c/5d029799d381a9ee06209a222cae75f04c5d5304"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7a965da79f2d22601f329cbfce588386b0847544",
          "url": "https://git.kernel.org/stable/c/7a965da79f2d22601f329cbfce588386b0847544"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/965982feb333aefa9256c0fe188b5f1b958aef63",
          "url": "https://git.kernel.org/stable/c/965982feb333aefa9256c0fe188b5f1b958aef63"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9a8d602f0723586e668bae7e65c832ceb9bcc8bc",
          "url": "https://git.kernel.org/stable/c/9a8d602f0723586e668bae7e65c832ceb9bcc8bc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/adac9ac6d2e04ea0782b91a00ba10706002f3ec4",
          "url": "https://git.kernel.org/stable/c/adac9ac6d2e04ea0782b91a00ba10706002f3ec4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d52252a1de4cf96a34f722b0cd8902d8ff78eb57",
          "url": "https://git.kernel.org/stable/c/d52252a1de4cf96a34f722b0cd8902d8ff78eb57"
        }
      ],
      "release_date": "2025-10-01T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39993",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nmedia: rc: fix races with imon_disconnect()\nSyzbot reports a KASAN issue as below:\nBUG: KASAN: use-after-free in __create_pipe include/linux/usb.h:1945 [inline]\nBUG: KASAN: use-after-free in send_packet+0xa2d/0xbc0 drivers/media/rc/imon.c:627\nRead of size 4 at addr ffff8880256fb000 by task syz-executor314/4465\nCPU: 2 PID: 4465 Comm: syz-executor314 Not tainted 6.0.0-rc1-syzkaller #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014\nCall Trace:\n<TASK>\n__dump_stack lib/dump_stack.c:88 [inline]\ndump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\nprint_address_description mm/kasan/report.c:317 [inline]\nprint_report.cold+0x2ba/0x6e9 mm/kasan/report.c:433\nkasan_report+0xb1/0x1e0 mm/kasan/report.c:495\n__create_pipe include/linux/usb.h:1945 [inline]\nsend_packet+0xa2d/0xbc0 drivers/media/rc/imon.c:627\nvfd_write+0x2d9/0x550 drivers/media/rc/imon.c:991\nvfs_write+0x2d7/0xdd0 fs/read_write.c:576\nksys_write+0x127/0x250 fs/read_write.c:631\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\nThe iMON driver improperly releases the usb_device reference in\nimon_disconnect without coordinating with active users of the\ndevice.\nSpecifically, the fields usbdev_intf0 and usbdev_intf1 are not\nprotected by the users counter (ictx->users). During probe,\nimon_init_intf0 or imon_init_intf1 increments the usb_device\nreference count depending on the interface. However, during\ndisconnect, usb_put_dev is called unconditionally, regardless of\nactual usage.\nAs a result, if vfd_write or other operations are still in\nprogress after disconnect, this can lead to a use-after-free of\nthe usb_device pointer.\nThread 1 vfd_write                      Thread 2 imon_disconnect\n...\nif\nusb_put_dev(ictx->usbdev_intf0)\nelse\nusb_put_dev(ictx->usbdev_intf1)\n...\nwhile\nsend_packet\nif\npipe = usb_sndintpipe(\nictx->usbdev_intf0) UAF\nelse\npipe = usb_sndctrlpipe(\nictx->usbdev_intf0, 0) UAF\nGuard access to usbdev_intf0 and usbdev_intf1 after disconnect by\nchecking ictx->disconnected in all writer paths. Add early return\nwith -ENODEV in send_packet(), vfd_write(), lcd_write() and\ndisplay_open() if the device is no longer present.\nSet and read ictx->disconnected under ictx->lock to ensure memory\nsynchronization. Acquire the lock in imon_disconnect() before setting\nthe flag to synchronize with any ongoing operations.\nEnsure writers exit early and safely after disconnect before the USB\ncore proceeds with cleanup.\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39993"
        }
      ],
      "release_date": "2025-10-15T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37810",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc3: gadget: check that event count does not exceed event buffer length\n\nThe event count is read from register DWC3_GEVNTCOUNT.\nThere is a check for the count being zero, but not for exceeding the\nevent buffer length.\nCheck that event count does not exceed event buffer length,\navoiding an out-of-bounds access when memcpy'ing the event.\nCrash log:\nUnable to handle kernel paging request at virtual address ffffffc0129be000\npc : __memcpy+0x114/0x180\nlr : dwc3_check_event_buf+0xec/0x348\nx3 : 0000000000000030 x2 : 000000000000dfc4\nx1 : ffffffc0129be000 x0 : ffffff87aad60080\nCall trace:\n__memcpy+0x114/0x180\ndwc3_interrupt+0x24/0x34",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37810"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/015c39f38e69a491d2abd5e98869a500a9459b3b",
          "url": "https://git.kernel.org/stable/c/015c39f38e69a491d2abd5e98869a500a9459b3b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/52a7c9d930b95aa8b1620edaba4818040c32631f",
          "url": "https://git.kernel.org/stable/c/52a7c9d930b95aa8b1620edaba4818040c32631f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/63ccd26cd1f6600421795f6ca3e625076be06c9f",
          "url": "https://git.kernel.org/stable/c/63ccd26cd1f6600421795f6ca3e625076be06c9f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/99d655119b870ee60e4dbf310aa9a1ed8d9ede3d",
          "url": "https://git.kernel.org/stable/c/99d655119b870ee60e4dbf310aa9a1ed8d9ede3d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a44547015287a19001384fe94dbff84c92ce4ee1",
          "url": "https://git.kernel.org/stable/c/a44547015287a19001384fe94dbff84c92ce4ee1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b43225948b231b3f331194010f84512bee4d9f59",
          "url": "https://git.kernel.org/stable/c/b43225948b231b3f331194010f84512bee4d9f59"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c0079630f268843a25ed75226169cba40e0d8880",
          "url": "https://git.kernel.org/stable/c/c0079630f268843a25ed75226169cba40e0d8880"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c4d80e41cb42008dceb35e5dbf52574d93beac0d",
          "url": "https://git.kernel.org/stable/c/c4d80e41cb42008dceb35e5dbf52574d93beac0d"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-08T07:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38416",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFC: nci: uart: Set tty->disc_data only in success path\n\nSetting tty->disc_data before opening the NCI device means we need to\nclean it up on error paths.  This also opens some short window if device\nstarts sending data, even before NCIUARTSETDRIVER IOCTL succeeded\n(broken hardware?).  Close the window by exposing tty->disc_data only on\nthe success path, when opening of the NCI device and try_module_get()\nsucceeds.\n\nThe code differs in error path in one aspect: tty->disc_data won't be\never assigned thus NULL-ified.  This however should not be relevant\ndifference, because of \"tty->disc_data=NULL\" in nci_uart_tty_open().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38416"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/000bfbc6bc334a93fffca8f5aa9583e7b6356cb5",
          "url": "https://git.kernel.org/stable/c/000bfbc6bc334a93fffca8f5aa9583e7b6356cb5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/55c3dbd8389636161090a2b2b6d2d709b9602e9c",
          "url": "https://git.kernel.org/stable/c/55c3dbd8389636161090a2b2b6d2d709b9602e9c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a514fca2b8e95838a3ba600f31a18fa60b76d893",
          "url": "https://git.kernel.org/stable/c/a514fca2b8e95838a3ba600f31a18fa60b76d893"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a8acc7080ad55c5402a1b818b3008998247dda87",
          "url": "https://git.kernel.org/stable/c/a8acc7080ad55c5402a1b818b3008998247dda87"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ac6992f72bd8e22679c1e147ac214de6a7093c23",
          "url": "https://git.kernel.org/stable/c/ac6992f72bd8e22679c1e147ac214de6a7093c23"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dc7722619a9c307e9938d735cf4a2210d3d48dcb",
          "url": "https://git.kernel.org/stable/c/dc7722619a9c307e9938d735cf4a2210d3d48dcb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e9799db771b2d574d5bf0dfb3177485e5f40d4d6",
          "url": "https://git.kernel.org/stable/c/e9799db771b2d574d5bf0dfb3177485e5f40d4d6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fc27ab48904ceb7e4792f0c400f1ef175edf16fe",
          "url": "https://git.kernel.org/stable/c/fc27ab48904ceb7e4792f0c400f1ef175edf16fe"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-25T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-50258",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds()\n\nThis patch fixes a stack-out-of-bounds read in brcmfmac that occurs\nwhen 'buf' that is not null-terminated is passed as an argument of\nstrsep() in brcmf_c_preinit_dcmds(). This buffer is filled with a firmware\nversion string by memcpy() in brcmf_fil_iovar_data_get().\nThe patch ensures buf is null-terminated.\n\nFound by a modified version of syzkaller.\n\n[   47.569679][ T1897] brcmfmac: brcmf_fw_alloc_request: using brcm/brcmfmac43236b for chip BCM43236/3\n[   47.582839][ T1897] brcmfmac: brcmf_c_process_clm_blob: no clm_blob available (err=-2), device may have limited channels available\n[   47.601565][ T1897] ==================================================================\n[   47.602574][ T1897] BUG: KASAN: stack-out-of-bounds in strsep+0x1b2/0x1f0\n[   47.603447][ T1897] Read of size 1 at addr ffffc90001f6f000 by task kworker/0:2/1897\n[   47.604336][ T1897]\n[   47.604621][ T1897] CPU: 0 PID: 1897 Comm: kworker/0:2 Tainted: G           O      5.14.0+ #131\n[   47.605617][ T1897] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org 04/01/2014\n[   47.606907][ T1897] Workqueue: usb_hub_wq hub_event\n[   47.607453][ T1897] Call Trace:\n[   47.607801][ T1897]  dump_stack_lvl+0x8e/0xd1\n[   47.608295][ T1897]  print_address_description.constprop.0.cold+0xf/0x334\n[   47.609009][ T1897]  ? strsep+0x1b2/0x1f0\n[   47.609434][ T1897]  ? strsep+0x1b2/0x1f0\n[   47.609863][ T1897]  kasan_report.cold+0x83/0xdf\n[   47.610366][ T1897]  ? strsep+0x1b2/0x1f0\n[   47.610882][ T1897]  strsep+0x1b2/0x1f0\n[   47.611300][ T1897]  ? brcmf_fil_iovar_data_get+0x3a/0xf0\n[   47.611883][ T1897]  brcmf_c_preinit_dcmds+0x995/0xc40\n[   47.612434][ T1897]  ? brcmf_c_set_joinpref_default+0x100/0x100\n[   47.613078][ T1897]  ? rcu_read_lock_sched_held+0xa1/0xd0\n[   47.613662][ T1897]  ? rcu_read_lock_bh_held+0xb0/0xb0\n[   47.614208][ T1897]  ? lock_acquire+0x19d/0x4e0\n[   47.614704][ T1897]  ? find_held_lock+0x2d/0x110\n[   47.615236][ T1897]  ? brcmf_usb_deq+0x1a7/0x260\n[   47.615741][ T1897]  ? brcmf_usb_rx_fill_all+0x5a/0xf0\n[   47.616288][ T1897]  brcmf_attach+0x246/0xd40\n[   47.616758][ T1897]  ? wiphy_new_nm+0x1703/0x1dd0\n[   47.617280][ T1897]  ? kmemdup+0x43/0x50\n[   47.617720][ T1897]  brcmf_usb_probe+0x12de/0x1690\n[   47.618244][ T1897]  ? brcmf_usbdev_qinit.constprop.0+0x470/0x470\n[   47.618901][ T1897]  usb_probe_interface+0x2aa/0x760\n[   47.619429][ T1897]  ? usb_probe_device+0x250/0x250\n[   47.619950][ T1897]  really_probe+0x205/0xb70\n[   47.620435][ T1897]  ? driver_allows_async_probing+0x130/0x130\n[   47.621048][ T1897]  __driver_probe_device+0x311/0x4b0\n[   47.621595][ T1897]  ? driver_allows_async_probing+0x130/0x130\n[   47.622209][ T1897]  driver_probe_device+0x4e/0x150\n[   47.622739][ T1897]  __device_attach_driver+0x1cc/0x2a0\n[   47.623287][ T1897]  bus_for_each_drv+0x156/0x1d0\n[   47.623796][ T1897]  ? bus_rescan_devices+0x30/0x30\n[   47.624309][ T1897]  ? lockdep_hardirqs_on_prepare+0x273/0x3e0\n[   47.624907][ T1897]  ? trace_hardirqs_on+0x46/0x160\n[   47.625437][ T1897]  __device_attach+0x23f/0x3a0\n[   47.625924][ T1897]  ? device_bind_driver+0xd0/0xd0\n[   47.626433][ T1897]  ? kobject_uevent_env+0x287/0x14b0\n[   47.627057][ T1897]  bus_probe_device+0x1da/0x290\n[   47.627557][ T1897]  device_add+0xb7b/0x1eb0\n[   47.628027][ T1897]  ? wait_for_completion+0x290/0x290\n[   47.628593][ T1897]  ? __fw_devlink_link_to_suppliers+0x5a0/0x5a0\n[   47.629249][ T1897]  usb_set_configuration+0xf59/0x16f0\n[   47.629829][ T1897]  usb_generic_driver_probe+0x82/0xa0\n[   47.630385][ T1897]  usb_probe_device+0xbb/0x250\n[   47.630927][ T1897]  ? usb_suspend+0x590/0x590\n[   47.631397][ T1897]  really_probe+0x205/0xb70\n[   47.631855][ T1897]  ? driver_allows_async_probing+0x130/0x130\n[   47.632469][ T1897]  __driver_probe_device+0x311/0x4b0\n[   47.633002][ \n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-50258"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0a06cadcc2a0044e4a117cc0e61436fc3a0dad69",
          "url": "https://git.kernel.org/stable/c/0a06cadcc2a0044e4a117cc0e61436fc3a0dad69"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/17dbe90e13f52848c460d253f15b765038ec6dc0",
          "url": "https://git.kernel.org/stable/c/17dbe90e13f52848c460d253f15b765038ec6dc0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3a3a5e3f94068cd562d62a57da6983c8cd07d53c",
          "url": "https://git.kernel.org/stable/c/3a3a5e3f94068cd562d62a57da6983c8cd07d53c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/881f50d76c3892262730ddf5c894eb00310e736c",
          "url": "https://git.kernel.org/stable/c/881f50d76c3892262730ddf5c894eb00310e736c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/89243a7b0ea19606ba1c2873c9d569026ccb344f",
          "url": "https://git.kernel.org/stable/c/89243a7b0ea19606ba1c2873c9d569026ccb344f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ba166e0ebdde3dfa833f0a3edaf2b2934d4a87f7",
          "url": "https://git.kernel.org/stable/c/ba166e0ebdde3dfa833f0a3edaf2b2934d4a87f7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d481fd6064bf215d7c5068e15aa390c3b16c9cd0",
          "url": "https://git.kernel.org/stable/c/d481fd6064bf215d7c5068e15aa390c3b16c9cd0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d6ef66194bb4a6c18f5b9649bf62597909b040e4",
          "url": "https://git.kernel.org/stable/c/d6ef66194bb4a6c18f5b9649bf62597909b040e4"
        }
      ],
      "release_date": "2025-09-15T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53596",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers: base: Free devm resources when unregistering a device\n\nIn the current code, devres_release_all() only gets called if the device\nhas a bus and has been probed.\n\nThis leads to issues when using bus-less or driver-less devices where\nthe device might never get freed if a managed resource holds a reference\nto the device. This is happening in the DRM framework for example.\n\nWe should thus call devres_release_all() in the device_del() function to\nmake sure that the device-managed actions are properly executed when the\ndevice is unregistered, even if it has neither a bus nor a driver.\n\nThis is effectively the same change than commit 2f8d16a996da (\"devres:\nrelease resources on device_del()\") that got reverted by commit\na525a3ddeaca (\"driver core: free devres in device_release\") over\nmemory leaks concerns.\n\nThis patch effectively combines the two commits mentioned above to\nrelease the resources both on device_del() and device_release() and get\nthe best of both worlds.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53596"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/297992e5c63528e603666e36081836204fc36ec9",
          "url": "https://git.kernel.org/stable/c/297992e5c63528e603666e36081836204fc36ec9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3bcc4c2a096e8342c8c719e595ce15de212694dd",
          "url": "https://git.kernel.org/stable/c/3bcc4c2a096e8342c8c719e595ce15de212694dd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/699fb50d99039a50e7494de644f96c889279aca3",
          "url": "https://git.kernel.org/stable/c/699fb50d99039a50e7494de644f96c889279aca3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c8c426fae26086a0ca8ab6cc6da2de79810ec038",
          "url": "https://git.kernel.org/stable/c/c8c426fae26086a0ca8ab6cc6da2de79810ec038"
        }
      ],
      "release_date": "2025-10-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-22083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost-scsi: Fix handling of multiple calls to vhost_scsi_set_endpoint\n\nIf vhost_scsi_set_endpoint is called multiple times without a\nvhost_scsi_clear_endpoint between them, we can hit multiple bugs\nfound by Haoran Zhang:\n\n1. Use-after-free when no tpgs are found:\n\nThis fixes a use after free that occurs when vhost_scsi_set_endpoint is\ncalled more than once and calls after the first call do not find any\ntpgs to add to the vs_tpg. When vhost_scsi_set_endpoint first finds\ntpgs to add to the vs_tpg array match=true, so we will do:\n\nvhost_vq_set_backend(vq, vs_tpg);\n...\n\nkfree(vs->vs_tpg);\nvs->vs_tpg = vs_tpg;\n\nIf vhost_scsi_set_endpoint is called again and no tpgs are found\nmatch=false so we skip the vhost_vq_set_backend call leaving the\npointer to the vs_tpg we then free via:\n\nkfree(vs->vs_tpg);\nvs->vs_tpg = vs_tpg;\n\nIf a scsi request is then sent we do:\n\nvhost_scsi_handle_vq -> vhost_scsi_get_req -> vhost_vq_get_backend\n\nwhich sees the vs_tpg we just did a kfree on.\n\n2. Tpg dir removal hang:\n\nThis patch fixes an issue where we cannot remove a LIO/target layer\ntpg (and structs above it like the target) dir due to the refcount\ndropping to -1.\n\nThe problem is that if vhost_scsi_set_endpoint detects a tpg is already\nin the vs->vs_tpg array or if the tpg has been removed so\ntarget_depend_item fails, the undepend goto handler will do\ntarget_undepend_item on all tpgs in the vs_tpg array dropping their\nrefcount to 0. At this time vs_tpg contains both the tpgs we have added\nin the current vhost_scsi_set_endpoint call as well as tpgs we added in\nprevious calls which are also in vs->vs_tpg.\n\nLater, when vhost_scsi_clear_endpoint runs it will do\ntarget_undepend_item on all the tpgs in the vs->vs_tpg which will drop\ntheir refcount to -1. Userspace will then not be able to remove the tpg\nand will hang when it tries to do rmdir on the tpg dir.\n\n3. Tpg leak:\n\nThis fixes a bug where we can leak tpgs and cause them to be\nun-removable because the target name is overwritten when\nvhost_scsi_set_endpoint is called multiple times but with different\ntarget names.\n\nThe bug occurs if a user has called VHOST_SCSI_SET_ENDPOINT and setup\na vhost-scsi device to target/tpg mapping, then calls\nVHOST_SCSI_SET_ENDPOINT again with a new target name that has tpgs we\nhaven't seen before (target1 has tpg1 but target2 has tpg2). When this\nhappens we don't teardown the old target tpg mapping and just overwrite\nthe target name and the vs->vs_tpg array. Later when we do\nvhost_scsi_clear_endpoint, we are passed in either target1 or target2's\nname and we will only match that target's tpgs when we loop over the\nvs->vs_tpg. We will then return from the function without doing\ntarget_undepend_item on the tpgs.\n\nBecause of all these bugs, it looks like being able to call\nvhost_scsi_set_endpoint multiple times was never supported. The major\nuser, QEMU, already has checks to prevent this use case. So to fix the\nissues, this patch prevents vhost_scsi_set_endpoint from being called\nif it's already successfully added tpgs. To add, remove or change the\ntpg config or target name, you must do a vhost_scsi_clear_endpoint\nfirst.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-22083"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2b34bdc42df047794542f3e220fe989124e4499a",
          "url": "https://git.kernel.org/stable/c/2b34bdc42df047794542f3e220fe989124e4499a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3a19eb3d9818e28f14c818a18dc913344a52ca92",
          "url": "https://git.kernel.org/stable/c/3a19eb3d9818e28f14c818a18dc913344a52ca92"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3fd054baf382a426bbf5135ede0fc5673db74d3e",
          "url": "https://git.kernel.org/stable/c/3fd054baf382a426bbf5135ede0fc5673db74d3e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/451c72f5e7cf5d339a6410a635cee0825687c3dc",
          "url": "https://git.kernel.org/stable/c/451c72f5e7cf5d339a6410a635cee0825687c3dc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5dd639a1646ef5fe8f4bf270fad47c5c3755b9b6",
          "url": "https://git.kernel.org/stable/c/5dd639a1646ef5fe8f4bf270fad47c5c3755b9b6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/63b449f73ab0dcc0ba11ceaa4c5c70bc86ccf03c",
          "url": "https://git.kernel.org/stable/c/63b449f73ab0dcc0ba11ceaa4c5c70bc86ccf03c"
        }
      ],
      "release_date": "2025-04-16T15:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37739",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid out-of-bounds access in f2fs_truncate_inode_blocks()\n\nsyzbot reports an UBSAN issue as below:\n\n------------[ cut here ]------------\nUBSAN: array-index-out-of-bounds in fs/f2fs/node.h:381:10\nindex 18446744073709550692 is out of range for type '__le32[5]' (aka 'unsigned int[5]')\nCPU: 0 UID: 0 PID: 5318 Comm: syz.0.0 Not tainted 6.14.0-rc3-syzkaller-00060-g6537cfb395f3 #0\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n ubsan_epilogue lib/ubsan.c:231 [inline]\n __ubsan_handle_out_of_bounds+0x121/0x150 lib/ubsan.c:429\n get_nid fs/f2fs/node.h:381 [inline]\n f2fs_truncate_inode_blocks+0xa5e/0xf60 fs/f2fs/node.c:1181\n f2fs_do_truncate_blocks+0x782/0x1030 fs/f2fs/file.c:808\n f2fs_truncate_blocks+0x10d/0x300 fs/f2fs/file.c:836\n f2fs_truncate+0x417/0x720 fs/f2fs/file.c:886\n f2fs_file_write_iter+0x1bdb/0x2550 fs/f2fs/file.c:5093\n aio_write+0x56b/0x7c0 fs/aio.c:1633\n io_submit_one+0x8a7/0x18a0 fs/aio.c:2052\n __do_sys_io_submit fs/aio.c:2111 [inline]\n __se_sys_io_submit+0x171/0x2e0 fs/aio.c:2081\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f238798cde9\n\nindex 18446744073709550692 (decimal, unsigned long long)\n= 0xfffffffffffffc64 (hexadecimal, unsigned long long)\n= -924 (decimal, long long)\n\nIn f2fs_truncate_inode_blocks(), UBSAN detects that get_nid() tries to\naccess .i_nid[-924], it means both offset[0] and level should zero.\n\nThe possible case should be in f2fs_do_truncate_blocks(), we try to\ntruncate inode size to zero, however, dn.ofs_in_node is zero and\ndn.node_page is not an inode page, so it fails to truncate inode page,\nand then pass zeroed free_from to f2fs_truncate_inode_blocks(), result\nin this issue.\n\n\tif (dn.ofs_in_node || IS_INODE(dn.node_page)) {\n\t\tf2fs_truncate_data_blocks_range(&dn, count);\n\t\tfree_from += count;\n\t}\n\nI guess the reason why dn.node_page is not an inode page could be: there\nare multiple nat entries share the same node block address, once the node\nblock address was reused, f2fs_get_node_page() may load a non-inode block.\n\nLet's add a sanity check for such condition to avoid out-of-bounds access\nissue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37739"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/67e16ccba74dd8de0a7b10062f1e02d77432f573",
          "url": "https://git.kernel.org/stable/c/67e16ccba74dd8de0a7b10062f1e02d77432f573"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6ba8b41d0aa4b82f90f0c416cb53fcef9696525d",
          "url": "https://git.kernel.org/stable/c/6ba8b41d0aa4b82f90f0c416cb53fcef9696525d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8b5e5aac44fee122947a269f9034c048e4c295de",
          "url": "https://git.kernel.org/stable/c/8b5e5aac44fee122947a269f9034c048e4c295de"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/98dbf2af63de0b551082c9bc48333910e009b09f",
          "url": "https://git.kernel.org/stable/c/98dbf2af63de0b551082c9bc48333910e009b09f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a67e1bf03c609a751d1740a1789af25e599966fa",
          "url": "https://git.kernel.org/stable/c/a67e1bf03c609a751d1740a1789af25e599966fa"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d7242fd7946d4cba0411effb6b5048ca55125747",
          "url": "https://git.kernel.org/stable/c/d7242fd7946d4cba0411effb6b5048ca55125747"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e6494977bd4a83862118a05f57a8df40256951c0",
          "url": "https://git.kernel.org/stable/c/e6494977bd4a83862118a05f57a8df40256951c0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ecc461331604b07cdbdb7360dbdf78471653264c",
          "url": "https://git.kernel.org/stable/c/ecc461331604b07cdbdb7360dbdf78471653264c"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-01T13:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38212",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipc: fix to protect IPCS lookups using RCU\n\nsyzbot reported that it discovered a use-after-free vulnerability, [0]\n\n[0]: https://lore.kernel.org/all/67af13f8.050a0220.21dd3.0038.GAE@google.com/\n\nidr_for_each() is protected by rwsem, but this is not enough.  If it is\nnot protected by RCU read-critical region, when idr_for_each() calls\nradix_tree_node_free() through call_rcu() to free the radix_tree_node\nstructure, the node will be freed immediately, and when reading the next\nnode in radix_tree_for_each_slot(), the already freed memory may be read.\n\nTherefore, we need to add code to make sure that idr_for_each() is\nprotected within the RCU read-critical region when we call it in\nshm_destroy_orphaned().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38212"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5180561afff8e0f029073c8c8117c95c6512d1f9",
          "url": "https://git.kernel.org/stable/c/5180561afff8e0f029073c8c8117c95c6512d1f9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5f1e1573bf103303944fd7225559de5d8297539c",
          "url": "https://git.kernel.org/stable/c/5f1e1573bf103303944fd7225559de5d8297539c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/68c173ea138b66d7dd1fd980c9bc578a18e11884",
          "url": "https://git.kernel.org/stable/c/68c173ea138b66d7dd1fd980c9bc578a18e11884"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/74bc813d11c30e28fc5261dc877cca662ccfac68",
          "url": "https://git.kernel.org/stable/c/74bc813d11c30e28fc5261dc877cca662ccfac68"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/78297d53d3878d43c1d627d20cd09f611fa4b91d",
          "url": "https://git.kernel.org/stable/c/78297d53d3878d43c1d627d20cd09f611fa4b91d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b0b6bf90ce2699a574b3683e22c44d0dcdd7a057",
          "url": "https://git.kernel.org/stable/c/b0b6bf90ce2699a574b3683e22c44d0dcdd7a057"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b968ba8bfd9f90914957bbbd815413bf6a98eca7",
          "url": "https://git.kernel.org/stable/c/b968ba8bfd9f90914957bbbd815413bf6a98eca7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d66adabe91803ef34a8b90613c81267b5ded1472",
          "url": "https://git.kernel.org/stable/c/d66adabe91803ef34a8b90613c81267b5ded1472"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-04T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38313",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbus: fsl-mc: fix double-free on mc_dev\n\nThe blamed commit tried to simplify how the deallocations are done but,\nin the process, introduced a double-free on the mc_dev variable.\n\nIn case the MC device is a DPRC, a new mc_bus is allocated and the\nmc_dev variable is just a reference to one of its fields. In this\ncircumstance, on the error path only the mc_bus should be freed.\n\nThis commit introduces back the following checkpatch warning which is a\nfalse-positive.\n\nWARNING: kfree(NULL) is safe and this check is probably not required\n+       if (mc_bus)\n+               kfree(mc_bus);",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38313"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/12e4431e5078847791936820bd39df9e1ee26d2e",
          "url": "https://git.kernel.org/stable/c/12e4431e5078847791936820bd39df9e1ee26d2e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1d5baab39e5b09a76870b345cdee7933871b881f",
          "url": "https://git.kernel.org/stable/c/1d5baab39e5b09a76870b345cdee7933871b881f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3135e03a92f6b5259d0a7f25f728e9e7866ede3f",
          "url": "https://git.kernel.org/stable/c/3135e03a92f6b5259d0a7f25f728e9e7866ede3f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4b23c46eb2d88924b93aca647bde9a4b9cf62cf9",
          "url": "https://git.kernel.org/stable/c/4b23c46eb2d88924b93aca647bde9a4b9cf62cf9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7002b954c4a8b9965ba0f139812ee4a6f71beac8",
          "url": "https://git.kernel.org/stable/c/7002b954c4a8b9965ba0f139812ee4a6f71beac8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/873d47114fd5e5a1cad2018843671537cc71ac84",
          "url": "https://git.kernel.org/stable/c/873d47114fd5e5a1cad2018843671537cc71ac84"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b2057374f326303c86d8423415ab58656eebc695",
          "url": "https://git.kernel.org/stable/c/b2057374f326303c86d8423415ab58656eebc695"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d694bf8a9acdbd061596f3e7549bc8cb70750a60",
          "url": "https://git.kernel.org/stable/c/d694bf8a9acdbd061596f3e7549bc8cb70750a60"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-10T08:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T22:20:37.564267Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435",
          "product_ids": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773872435"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-tools-4.15.0-254-tuxcare.els52-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-source-4.15.0-0:4.15.0-254.265~16.04.1.all",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-generic-0:4.15.0-254.265~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-254-tuxcare.els52-lowlatency-0:4.15.0-254.265~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}