{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "* CVE-2023-53515\n     - virtio-mmio: don't break lifecycle of vm_dev {CVE-2023-53515}\n   * CVE-2025-39967\n     - fbcon: fix integer overflow in fbcon_do_set_font {CVE-2025-39967}\n     - fbcon: Fix OOB access in font allocation {CVE-2025-39967}\n   * CVE-2025-38702\n     - fbdev: fix potential buffer overflow in do_register_framebuffer()\n       {CVE-2025-38702}\n   * CVE-2025-38563\n     - perf/core: Prevent VMA split of buffer mappings {CVE-2025-38563}\n   * CVE-2025-39869\n     - dmaengine: ti: edma: Fix memory allocation size for queue_priority_map\n       {CVE-2025-39869}\n   * CVE-2023-53577\n     - bpf, cpumap: Make sure kthread is running before map update returns\n       {CVE-2023-53577}\n   * CVE-2023-53608\n     - nilfs2: fix potential UAF of struct nilfs_sc_info in nilfs_segctor_thread()\n       {CVE-2023-53608}\n   * CVE-2023-53604\n     - dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path\n       {CVE-2023-53604}\n   * CVE-2023-53619\n     - netfilter: Replace printk() with pr_*() and define pr_fmt() {CVE-2023-53619}\n     - netfilter: use kvmalloc_array to allocate memory for hashtable\n       {CVE-2023-53619}\n     - netfilter: conntrack: Avoid nf_ct_helper_hash uses after free\n       {CVE-2023-53619}\n   * CVE-2025-38680\n     - media: uvcvideo: Fix 1-byte out-of-bounds read in {CVE-2025-38680}\n   * CVE-2023-53454\n     - HID: multitouch: Correct devm device reference for hidinput {CVE-2023-53454}\n   * CVE-2025-38699\n     - scsi: bfa: Double-free fix {CVE-2025-38699}\n     - ubi: ensure that VID header offset + VID header size <= alloc, size\n       {CVE-2023-53265}\n     - scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()\n       {CVE-2023-53676}\n     - fs: jfs: Fix UBSAN: array-index-out-of-bounds in {CVE-2025-38699}\n   * CVE-2023-53596\n     - drivers: base: Free devm resources when unregistering a {CVE-2023-53596}\n   * CVE-2023-53622\n     - gfs2: Fix possible data races in gfs2_show_options() {CVE-2023-53622}\n     - HSI: ssi_protocol: Fix use after free vulnerability in ssi_protocol Driver\n       Due to Race Condition {CVE-2023-53622}\n   * CVE-2023-53090\n     - drm/amdkfd: Fix an illegal memory access {CVE-2023-53090}\n   * CVE-2023-53116\n     - nvmet: avoid potential UAF in nvmet_req_complete() {CVE-2023-53116}\n   * CVE-2023-53138\n     - net: caif: Fix use-after-free in cfusbl_device_notify() {CVE-2023-53138}\n   * CVE-2023-53035\n     - nilfs2: fix kernel-infoleak in nilfs_ioctl_wrap_copy() {CVE-2023-53035}\n   * CVE-2023-53668\n     - ring-buffer: Fix deadloop issue on reading trace_pipe {CVE-2023-53668}\n   * CVE-2023-53616\n     - jfs: fix invalid free of JFS_IP(ipimap)->i_imap in diUnmount\n       {CVE-2023-53616}\n   * CVE-2023-53554\n     - staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext()\n       {CVE-2023-53554}\n   * CVE-2023-53587\n     - ring-buffer: Sync IRQ works before buffer destruction {CVE-2023-53587}\n   * CVE-2023-53541\n     - mtd: rawnand: brcmnand: Fix potential out-of-bounds access in oob write\n       {CVE-2023-53541}\n   * CVE-2023-53559\n     - ip_vti: fix potential slab-use-after-free in decode_session6\n       {CVE-2023-53559}\n   * CVE-2023-53484\n     - lib: cpu_rmap: Avoid use after free on rmap->obj array entries\n       {CVE-2023-53484}\n     - lib: cpu_rmap: Fix potential use-after-free in irq_cpu_rmap_release()\n       {CVE-2023-53484}\n   * CVE-2025-39824\n     - HID: asus: fix UAF via HID_CLAIMED_INPUT validation {CVE-2025-39824}\n   * CVE-2025-38715\n     - hfs: fix slab-out-of-bounds in hfs_bnode_read() {CVE-2025-38715}\n   * CVE-2023-53153\n     - wifi: cfg80211: Fix use after free for wext {CVE-2023-53153}\n   * CVE-2025-38555\n     - usb: gadget : fix use-after-free in composite_dev_cleanup() {CVE-2025-38555}\n   * CVE-2025-39743\n     - jfs: truncate good inode pages when hard link is 0 {CVE-2025-39743}\n   * CVE-2025-39945\n     - cnic: Fix use-after-free bugs in cnic_delete_task {CVE-2025-39945}\n   * CVE-2023-53506\n     - udf: Do not bother merging very long extents {CVE-2023-53506}\n   * CVE-2025-38714\n     - hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read() {CVE-2025-38714}\n   * CVE-2025-39685\n     - comedi: pcl726: Prevent invalid irq number {CVE-2025-39685}\n   * CVE-2025-39839\n     - batman-adv: fix OOB read/write in network-coding decode {CVE-2025-39839}\n   * CVE-2025-38708\n     - drbd: add missing kref_get in handle_write_conflicts {CVE-2025-38708}\n   * CVE-2023-53521\n     - scsi: ses: Fix slab-out-of-bounds in ses_intf_remove() {CVE-2023-53521}\n   * CVE-2025-38713\n     - hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() {CVE-2025-38713}\n   * CVE-2023-53675\n     - scsi: ses: Fix possible desc_ptr out-of-bounds accesses {CVE-2023-53675}\n   * CVE-2025-39691\n     - fs/buffer: fix use-after-free when call bh_read() helper {CVE-2025-39691}\n   * CVE-2023-53259\n     - VMCI: check context->notify_page after call to get_user_pages_fast() to\n       avoid GPF {CVE-2023-53259}\n   * CVE-2023-53285\n     - ext4: add bounds checking in get_max_inline_xattr_value_size()\n       {CVE-2023-53285}\n   * CVE-2023-53148\n     - igb: Fix igb_down hung on surprise removal {CVE-2023-53148}\n   * CVE-2023-53219\n     - media: netup_unidvb: fix use-after-free at del_timer() {CVE-2023-53219}\n   * CVE-2023-53215\n     - sched/fair: Don't balance task to its current running CPU {CVE-2023-53215}\n   * CVE-2023-53305\n     - Bluetooth: L2CAP: Fix use-after-free {CVE-2023-53305}\n   * CVE-2025-38103\n     - HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse()\n       {CVE-2025-38103}\n   * CVE-2025-38051\n     - smb: client: Fix use-after-free in cifs_fill_dirent {CVE-2025-38051}\n   * CVE-2025-38157\n     - wifi: ath9k_htc: Abort software beacon handling if disabled {CVE-2025-38157}\n   * CVE-2023-53373\n     - crypto: seqiv - Handle EBUSY correctly {CVE-2023-53373}\n   * CVE-2025-38079\n     - crypto: algif_hash - fix double free in hash_accept {CVE-2025-38079}\n   * CVE-2025-38212\n     - ipc: fix to protect IPCS lookups using RCU {CVE-2025-38212}\n   * CVE-2025-38313\n     - bus: fsl-mc: fix double-free on mc_dev {CVE-2025-38313}\n   * CVE-2023-53311\n     - nilfs2: fix use-after-free of nilfs_root in dirtying inodes via iput\n       {CVE-2023-53311}\n   * CVE-2023-53307\n     - rbd: avoid use-after-free in do_rbd_add() when rbd_dev_create() fails\n       {CVE-2023-53307}\n   * CVE-2025-38403\n     - vsock/vmci: Clear the vmci transport packet properly when initializing it\n       {CVE-2025-38403}\n   * CVE-2025-39683\n     - tracing: Limit access to parser->buffer when trace_get_user failed\n       {CVE-2025-39683}\n   * CVE-2025-38697\n     - jfs: upper bound check of tree index in dbAllocAG {CVE-2025-38697}\n   * CVE-2025-39689\n     - ftrace: Also allocate and copy hash for reading of filter files\n       {CVE-2025-39689}\n   * CVE-2025-38574\n     - pptp: ensure minimal skb length in pptp_xmit() {CVE-2025-38574}\n   * CVE-2025-38572\n     - ipv6: reject malicious packets in ipv6_gso_segment() {CVE-2025-38572}\n   * CVE-2025-38685\n     - fbdev: Fix vmalloc out-of-bounds write in fast_imageblit {CVE-2025-38685}\n   * CVE-2025-39911\n     - i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path\n       {CVE-2025-39911}\n   * CVE-2025-39973\n     - i40e: increase max descriptors for XL710 {CVE-2025-39973}\n     - i40e: add validation for ring_len param {CVE-2025-39973}\n   * CVE-2025-38724\n     - nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()\n       {CVE-2025-38724}\n   * CVE-2025-39860\n     - Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen()\n       {CVE-2025-39860}\n   * CVE-2025-38530\n     - comedi: pcl812: Fix bit shift out of bounds {CVE-2025-38530}\n   * CVE-2025-38529\n     - comedi: aio_iiro_16: Fix bit shift out of bounds {CVE-2025-38529}\n   * CVE-2025-38497\n     - usb: gadget: configfs: Fix OOB read on empty string write {CVE-2025-38497}\n   * CVE-2025-38483\n     - comedi: das16m1: Fix bit shift out of bounds {CVE-2025-38483}\n   * CVE-2025-38482\n     - comedi: das6402: Fix bit shift out of bounds {CVE-2025-38482}\n   * CVE-2025-39702\n     - ipv6: sr: Fix MAC comparison to be constant-time {CVE-2025-39702}\n   * CVE-2025-39730\n     - NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() {CVE-2025-39730}\n   * CVE-2025-39817\n     - efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare {CVE-2025-39817}\n   * CVE-2025-38494\n     - HID: core: ensure the allocated report buffer can contain the reserved\n       report ID {CVE-2025-38494}\n     - HID: core: ensure __hid_request reserves the report ID as the first byte\n       {CVE-2025-38494}\n     - HID: core: do not bypass hid_hw_raw_request {CVE-2025-38494}\n   * CVE-2025-38527\n     - smb: client: fix use-after-free in cifs_oplock_break {CVE-2025-38527}\n   * CVE-2025-39965\n     - xfrm: Duplicate SPI Handling {CVE-2025-39965}\n   * CVE-2025-37927\n     - iommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid\n       {CVE-2025-37927}\n   * CVE-2025-37817\n     - mcb: fix error handling for different scenarios when parsing\n       {CVE-2025-37817}\n     - mcb: fix a double free bug in chameleon_parse_gdd() {CVE-2025-37817}\n   * CVE-2025-38204\n     - jfs: fix array-index-out-of-bounds read in add_missing_indices\n       {CVE-2025-38204}\n   * CVE-2025-38323\n     - net: atm: add lec_mutex {CVE-2025-38323}\n   * CVE-2025-38346\n     - ftrace: Fix UAF when lookup kallsym after ftrace disabled {CVE-2025-38346}\n   * CVE-2025-38348\n     - wifi: p54: prevent buffer-overflow in p54_rx_eeprom_readback()\n       {CVE-2025-38348}\n   * CVE-2025-38416\n     - NFC: nci: uart: Set tty->disc_data only in success path {CVE-2025-38416}\n   * CVE-2025-38428\n     - Input: ims-pcu - check record size in ims_pcu_flash_firmware()\n       {CVE-2025-38428}\n   * CVE-2025-38245\n     - atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister().\n       {CVE-2025-38245}\n   * CVE-2025-38377\n     - rose: fix dangling neighbour pointers in rose_rt_device_down()\n       {CVE-2025-38377}\n   * CVE-2025-38459\n     - atm: clip: Fix infinite recursive call of clip_push(). {CVE-2025-38459}\n   * CVE-2025-39863\n     - wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work\n       {CVE-2025-39863}\n   * CVE-2025-21726\n     - padata: avoid UAF for reorder_work {CVE-2025-21726}\n   * CVE-2025-39760\n     - usb: core: config: Prevent OOB read in SS endpoint companion parsing\n       {CVE-2025-39760}\n   * CVE-2025-38198\n     - fbcon: Make sure modelist not set on unregistered console {CVE-2025-38198}\n   * CVE-2025-38375\n     - virtio-net: ensure the received length does not exceed allocated size\n       {CVE-2025-38375}\n   * CVE-2025-39993\n     - media: imon: reorganize serialization {CVE-2025-39993}\n     - media: rc: fix races with imon_disconnect() {CVE-2025-39993}\n   * CVE-2025-39883\n     - mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison\n       memory {CVE-2025-39883}\n   * Focal update: v5.4.211 upstream stable release (LP: #1990190)\n     - scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user\n       input\n   * Focal update: v5.4.231 upstream stable release (LP: #2011226) //\n     CVE-2023-53000\n     - netlink: prevent potential spectre v1 gadgets\n   * CVE-2022-49980\n     - USB: gadget: Fix use-after-free Read in usb_udc_uevent()\n   * CVE-2022-21546\n     - scsi: target: Fix WRITE_SAME No Data Buffer crash\n   * Focal update: v5.4.225 upstream stable release (LP: #2002347) //\n     CVE-2022-49763\n     - ntfs: fix use-after-free in ntfs_attr_find()\n   * Focal update: Focal update: v5.4.235 upstream stable release\n     (LP: #2017706) // CVE-2022-50258\n     - wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds()\n   * CVE-2025-21727\n     - padata: fix UAF in padata_reorder\n   * CVE-2025-37882\n     - usb: xhci: Fix isochronous Ring Underrun/Overrun event handling\n   * CVE-2025-38250\n     - Bluetooth: hci_core: Fix use-after-free in vhci_flush()\n   * CVE-2025-39751\n     - ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control\n   * CVE-2025-37810\n     - usb: dwc3: gadget: check that event count does not exceed event buffer\n       length\n   * CVE-2025-37839\n     - jbd2: remove wrong sb->s_sequence check\n   * CVE-2025-37892\n     - mtd: inftlcore: Add error check for inftl_read_oob()\n   * CVE-2025-37923\n     - tracing: Fix oob write in trace_seq_to_buffer()\n   * CVE-2024-43883\n     - usb: vhci-hcd: Do not drop references before new references are gained\n   * CVE-2025-37739\n     - f2fs: lost matching-pair of trace in f2fs_truncate_inode_blocks\n     - f2fs: fix to avoid out-of-bounds access in f2fs_truncate_inode_blocks()\n   * CVE-2025-38069\n     - PCI: endpoint: pci-epf-test: Fix double free that causes kernel to oops\n   * CVE-2025-22083\n     - vhost-scsi: Fix handling of multiple calls to vhost_scsi_set_endpoint\n   * Miscellaneous upstream changes\n     - net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too\n     - HID: core: Harden s32ton() against conversion to 0 bits\n     - fbcon: Introduce wrapper for console->fb_info lookup {CVE-2025-38198}\n     - net: atm: fix /proc/net/atm/lec handling {CVE-2025-38323}",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/ubuntu18.04els/advisories/2026/clsa-2026_1773832495.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-03-18T11:27:13Z",
      "generator": {
        "date": "2026-03-18T11:27:13Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1773832495",
      "initial_release_date": "2026-03-18T11:27:13Z",
      "revision_history": [
        {
          "date": "2026-03-18T11:27:13Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "Fix of 114 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Ubuntu 18.04",
                "product": {
                  "name": "Ubuntu 18.04",
                  "product_id": "Ubuntu-18",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Ubuntu"
          }
        ],
        "category": "vendor",
        "name": "Canonical Ltd."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
                "product": {
                  "name": "linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
                  "product_id": "linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-headers-4.15.0-254-tuxcare.els42-generic@4.15.0-254.265?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
                "product": {
                  "name": "linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
                  "product_id": "linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency@4.15.0-254.265?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
                "product": {
                  "name": "linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
                  "product_id": "linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency@4.15.0-254.265?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
                "product": {
                  "name": "linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
                  "product_id": "linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-cloud-tools-4.15.0-254-tuxcare.els42@4.15.0-254.265?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
                "product": {
                  "name": "linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
                  "product_id": "linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-tools-4.15.0-254-tuxcare.els42-lowlatency@4.15.0-254.265?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
                "product": {
                  "name": "linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
                  "product_id": "linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-cloud-tools-4.15.0-254-tuxcare.els42-generic@4.15.0-254.265?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
                "product": {
                  "name": "linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
                  "product_id": "linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-modules-4.15.0-254-tuxcare.els42-generic@4.15.0-254.265?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
                "product": {
                  "name": "linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
                  "product_id": "linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency@4.15.0-254.265?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
                "product": {
                  "name": "linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
                  "product_id": "linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-tools-4.15.0-254-tuxcare.els42@4.15.0-254.265?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
                "product": {
                  "name": "linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
                  "product_id": "linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-buildinfo-4.15.0-254-tuxcare.els42-generic@4.15.0-254.265?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
                "product": {
                  "name": "linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
                  "product_id": "linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-modules-4.15.0-254-tuxcare.els42-lowlatency@4.15.0-254.265?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
                "product": {
                  "name": "linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
                  "product_id": "linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-modules-extra-4.15.0-254-tuxcare.els42-generic@4.15.0-254.265?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
                "product": {
                  "name": "linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
                  "product_id": "linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-image-unsigned-4.15.0-254-tuxcare.els42-generic@4.15.0-254.265?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-libc-dev-0:4.15.0-254.265.amd64",
                "product": {
                  "name": "linux-libc-dev-0:4.15.0-254.265.amd64",
                  "product_id": "linux-libc-dev-0:4.15.0-254.265.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-libc-dev@4.15.0-254.265?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
                "product": {
                  "name": "linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
                  "product_id": "linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-tools-4.15.0-254-tuxcare.els42-generic@4.15.0-254.265?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
                "product": {
                  "name": "linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
                  "product_id": "linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-headers-4.15.0-254-tuxcare.els42-lowlatency@4.15.0-254.265?arch=amd64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "linux-tools-host-0:4.15.0-254.265.all",
                "product": {
                  "name": "linux-tools-host-0:4.15.0-254.265.all",
                  "product_id": "linux-tools-host-0:4.15.0-254.265.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-tools-host@4.15.0-254.265?arch=all"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-common-0:4.15.0-254.265.all",
                "product": {
                  "name": "linux-tools-common-0:4.15.0-254.265.all",
                  "product_id": "linux-tools-common-0:4.15.0-254.265.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-tools-common@4.15.0-254.265?arch=all"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-source-4.15.0-0:4.15.0-254.265.all",
                "product": {
                  "name": "linux-source-4.15.0-0:4.15.0-254.265.all",
                  "product_id": "linux-source-4.15.0-0:4.15.0-254.265.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-source-4.15.0@4.15.0-254.265?arch=all"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-cloud-tools-common-0:4.15.0-254.265.all",
                "product": {
                  "name": "linux-cloud-tools-common-0:4.15.0-254.265.all",
                  "product_id": "linux-cloud-tools-common-0:4.15.0-254.265.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-cloud-tools-common@4.15.0-254.265?arch=all"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
                "product": {
                  "name": "linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
                  "product_id": "linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-headers-4.15.0-254-tuxcare.els42@4.15.0-254.265?arch=all"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-doc-0:4.15.0-254.265.all",
                "product": {
                  "name": "linux-doc-0:4.15.0-254.265.all",
                  "product_id": "linux-doc-0:4.15.0-254.265.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-doc@4.15.0-254.265?arch=all"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "all"
          }
        ],
        "category": "vendor",
        "name": "CloudLinux"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64"
        },
        "product_reference": "linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-host-0:4.15.0-254.265.all as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        },
        "product_reference": "linux-tools-host-0:4.15.0-254.265.all",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64"
        },
        "product_reference": "linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-common-0:4.15.0-254.265.all as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all"
        },
        "product_reference": "linux-tools-common-0:4.15.0-254.265.all",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64"
        },
        "product_reference": "linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64"
        },
        "product_reference": "linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64"
        },
        "product_reference": "linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64"
        },
        "product_reference": "linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64"
        },
        "product_reference": "linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-source-4.15.0-0:4.15.0-254.265.all as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all"
        },
        "product_reference": "linux-source-4.15.0-0:4.15.0-254.265.all",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64"
        },
        "product_reference": "linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64"
        },
        "product_reference": "linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-cloud-tools-common-0:4.15.0-254.265.all as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all"
        },
        "product_reference": "linux-cloud-tools-common-0:4.15.0-254.265.all",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64"
        },
        "product_reference": "linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64"
        },
        "product_reference": "linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64"
        },
        "product_reference": "linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64"
        },
        "product_reference": "linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-libc-dev-0:4.15.0-254.265.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64"
        },
        "product_reference": "linux-libc-dev-0:4.15.0-254.265.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64"
        },
        "product_reference": "linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all"
        },
        "product_reference": "linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-doc-0:4.15.0-254.265.all as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-doc-0:4.15.0-254.265.all"
        },
        "product_reference": "linux-doc-0:4.15.0-254.265.all",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64"
        },
        "product_reference": "linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-38348",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: p54: prevent buffer-overflow in p54_rx_eeprom_readback()\n\nRobert Morris reported:\n\n|If a malicious USB device pretends to be an Intersil p54 wifi\n|interface and generates an eeprom_readback message with a large\n|eeprom->v1.len, p54_rx_eeprom_readback() will copy data from the\n|message beyond the end of priv->eeprom.\n|\n|static void p54_rx_eeprom_readback(struct p54_common *priv,\n|                                   struct sk_buff *skb)\n|{\n|        struct p54_hdr *hdr = (struct p54_hdr *) skb->data;\n|        struct p54_eeprom_lm86 *eeprom = (struct p54_eeprom_lm86 *) hdr->data;\n|\n|        if (priv->fw_var >= 0x509) {\n|                memcpy(priv->eeprom, eeprom->v2.data,\n|                       le16_to_cpu(eeprom->v2.len));\n|        } else {\n|                memcpy(priv->eeprom, eeprom->v1.data,\n|                       le16_to_cpu(eeprom->v1.len));\n|        }\n| [...]\n\nThe eeprom->v{1,2}.len is set by the driver in p54_download_eeprom().\nThe device is supposed to provide the same length back to the driver.\nBut yes, it's possible (like shown in the report) to alter the value\nto something that causes a crash/panic due to overrun.\n\nThis patch addresses the issue by adding the size to the common device\ncontext, so p54_rx_eeprom_readback no longer relies on possibly tampered\nvalues... That said, it also checks if the \"firmware\" altered the value\nand no longer copies them.\n\nThe one, small saving grace is: Before the driver tries to read the eeprom,\nit needs to upload >a< firmware. the vendor firmware has a proprietary\nlicense and as a reason, it is not present on most distributions by\ndefault.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38348"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0e4dc150423b829c35cbcf399481ca11594fc036",
          "url": "https://git.kernel.org/stable/c/0e4dc150423b829c35cbcf399481ca11594fc036"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/12134f79e53eb56b0b0b7447fa0c512acf6a8422",
          "url": "https://git.kernel.org/stable/c/12134f79e53eb56b0b0b7447fa0c512acf6a8422"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1f7f8168abe8cbe845ab8bb557228d44784a6b57",
          "url": "https://git.kernel.org/stable/c/1f7f8168abe8cbe845ab8bb557228d44784a6b57"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6d05390d20f110de37d051a3e063ef0a542d01fb",
          "url": "https://git.kernel.org/stable/c/6d05390d20f110de37d051a3e063ef0a542d01fb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/714afb4c38edd19a057d519c1f9c5d164b43de94",
          "url": "https://git.kernel.org/stable/c/714afb4c38edd19a057d519c1f9c5d164b43de94"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9701f842031b825e2fd5f22d064166f8f13f6e4d",
          "url": "https://git.kernel.org/stable/c/9701f842031b825e2fd5f22d064166f8f13f6e4d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/da1b9a55ff116cb040528ef664c70a4eec03ae99",
          "url": "https://git.kernel.org/stable/c/da1b9a55ff116cb040528ef664c70a4eec03ae99"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f39b2f8c1549a539846e083790fad396ef6cd802",
          "url": "https://git.kernel.org/stable/c/f39b2f8c1549a539846e083790fad396ef6cd802"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-10T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38572",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: reject malicious packets in ipv6_gso_segment()\n\nsyzbot was able to craft a packet with very long IPv6 extension headers\nleading to an overflow of skb->transport_header.\n\nThis 16bit field has a limited range.\n\nAdd skb_reset_transport_header_careful() helper and use it\nfrom ipv6_gso_segment()\n\nWARNING: CPU: 0 PID: 5871 at ./include/linux/skbuff.h:3032 skb_reset_transport_header include/linux/skbuff.h:3032 [inline]\nWARNING: CPU: 0 PID: 5871 at ./include/linux/skbuff.h:3032 ipv6_gso_segment+0x15e2/0x21e0 net/ipv6/ip6_offload.c:151\nModules linked in:\nCPU: 0 UID: 0 PID: 5871 Comm: syz-executor211 Not tainted 6.16.0-rc6-syzkaller-g7abc678e3084 #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\n RIP: 0010:skb_reset_transport_header include/linux/skbuff.h:3032 [inline]\n RIP: 0010:ipv6_gso_segment+0x15e2/0x21e0 net/ipv6/ip6_offload.c:151\nCall Trace:\n <TASK>\n  skb_mac_gso_segment+0x31c/0x640 net/core/gso.c:53\n  nsh_gso_segment+0x54a/0xe10 net/nsh/nsh.c:110\n  skb_mac_gso_segment+0x31c/0x640 net/core/gso.c:53\n  __skb_gso_segment+0x342/0x510 net/core/gso.c:124\n  skb_gso_segment include/net/gso.h:83 [inline]\n  validate_xmit_skb+0x857/0x11b0 net/core/dev.c:3950\n  validate_xmit_skb_list+0x84/0x120 net/core/dev.c:4000\n  sch_direct_xmit+0xd3/0x4b0 net/sched/sch_generic.c:329\n  __dev_xmit_skb net/core/dev.c:4102 [inline]\n  __dev_queue_xmit+0x17b6/0x3a70 net/core/dev.c:4679",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38572"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/09ff062b89d8e48165247d677d1ca23d6d607e9b",
          "url": "https://git.kernel.org/stable/c/09ff062b89d8e48165247d677d1ca23d6d607e9b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3f638e0b28bde7c3354a0df938ab3a96739455d1",
          "url": "https://git.kernel.org/stable/c/3f638e0b28bde7c3354a0df938ab3a96739455d1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5489e7fc6f8be3062f8cb7e49406de4bfd94db67",
          "url": "https://git.kernel.org/stable/c/5489e7fc6f8be3062f8cb7e49406de4bfd94db67"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/573b8250fc2554761db3bc2bbdbab23789d52d4e",
          "url": "https://git.kernel.org/stable/c/573b8250fc2554761db3bc2bbdbab23789d52d4e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5dc60b2a00ed7629214ac0c48e43f40af2078703",
          "url": "https://git.kernel.org/stable/c/5dc60b2a00ed7629214ac0c48e43f40af2078703"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d45cf1e7d7180256e17c9ce88e32e8061a7887fe",
          "url": "https://git.kernel.org/stable/c/d45cf1e7d7180256e17c9ce88e32e8061a7887fe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/de322cdf600fc9433845a9e944d1ca6b31cfb67e",
          "url": "https://git.kernel.org/stable/c/de322cdf600fc9433845a9e944d1ca6b31cfb67e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ee851768e4b8371ce151fd446d24bf3ae2d18789",
          "url": "https://git.kernel.org/stable/c/ee851768e4b8371ce151fd446d24bf3ae2d18789"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ef05007b403dcc21e701cb1f30d4572ac0a9da20",
          "url": "https://git.kernel.org/stable/c/ef05007b403dcc21e701cb1f30d4572ac0a9da20"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-08-19T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38563",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/core: Prevent VMA split of buffer mappings\n\nThe perf mmap code is careful about mmap()'ing the user page with the\nringbuffer and additionally the auxiliary buffer, when the event supports\nit. Once the first mapping is established, subsequent mapping have to use\nthe same offset and the same size in both cases. The reference counting for\nthe ringbuffer and the auxiliary buffer depends on this being correct.\n\nThough perf does not prevent that a related mapping is split via mmap(2),\nmunmap(2) or mremap(2). A split of a VMA results in perf_mmap_open() calls,\nwhich take reference counts, but then the subsequent perf_mmap_close()\ncalls are not longer fulfilling the offset and size checks. This leads to\nreference count leaks.\n\nAs perf already has the requirement for subsequent mappings to match the\ninitial mapping, the obvious consequence is that VMA splits, caused by\nresizing of a mapping or partial unmapping, have to be prevented.\n\nImplement the vm_operations_struct::may_split() callback and return\nunconditionally -EINVAL.\n\nThat ensures that the mapping offsets and sizes cannot be changed after the\nfact. Remapping to a different fixed address with the same size is still\npossible as it takes the references for the new mapping and drops those of\nthe old mapping.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38563"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3bd518cc7ea61076bcd725e36ff0e690754977c0",
          "url": "https://git.kernel.org/stable/c/3bd518cc7ea61076bcd725e36ff0e690754977c0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/65311aad4c808bedad0c05d9bb8b06c47dae73eb",
          "url": "https://git.kernel.org/stable/c/65311aad4c808bedad0c05d9bb8b06c47dae73eb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6757a31a8e295ae4f01717a954afda173f25a121",
          "url": "https://git.kernel.org/stable/c/6757a31a8e295ae4f01717a954afda173f25a121"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7b84cb58d1f0aa07656802eae24689566e5f5b1b",
          "url": "https://git.kernel.org/stable/c/7b84cb58d1f0aa07656802eae24689566e5f5b1b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b024d7b56c77191cde544f838debb7f8451cd0d6",
          "url": "https://git.kernel.org/stable/c/b024d7b56c77191cde544f838debb7f8451cd0d6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d52451a9210f2e5a079ba052918c93563518a9ff",
          "url": "https://git.kernel.org/stable/c/d52451a9210f2e5a079ba052918c93563518a9ff"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e4346ffec2c44d6b0be834d59b20632b5bb5729e",
          "url": "https://git.kernel.org/stable/c/e4346ffec2c44d6b0be834d59b20632b5bb5729e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e529888b7e8092912dd8789bdfc76685ccd2ff5f",
          "url": "https://git.kernel.org/stable/c/e529888b7e8092912dd8789bdfc76685ccd2ff5f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ff668930871e0198c7f4e325058b8b7c286787bd",
          "url": "https://git.kernel.org/stable/c/ff668930871e0198c7f4e325058b8b7c286787bd"
        },
        {
          "category": "external",
          "summary": "https://www.zerodayinitiative.com/advisories/ZDI-25-873/",
          "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-873/"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-08-19T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39730",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFS: Fix filehandle bounds checking in nfs_fh_to_dentry()\n\nThe function needs to check the minimal filehandle length before it can\naccess the embedded filehandle.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39730"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/12ad3def2e5e0b120e3d0cb6ce8b7b796819ad40",
          "url": "https://git.kernel.org/stable/c/12ad3def2e5e0b120e3d0cb6ce8b7b796819ad40"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2ad40b7992aa26bc631afc1a995b0e3ddc30de3f",
          "url": "https://git.kernel.org/stable/c/2ad40b7992aa26bc631afc1a995b0e3ddc30de3f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3570ef5c31314c13274c935a20b91768ab5bf412",
          "url": "https://git.kernel.org/stable/c/3570ef5c31314c13274c935a20b91768ab5bf412"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/763810bb883cb4de412a72f338d80947d97df67b",
          "url": "https://git.kernel.org/stable/c/763810bb883cb4de412a72f338d80947d97df67b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7dd36f7477d1e03a1fcf8d13531ca326c4fb599f",
          "url": "https://git.kernel.org/stable/c/7dd36f7477d1e03a1fcf8d13531ca326c4fb599f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7f8eca87fef7519e9c41f3258f25ebc2752247ee",
          "url": "https://git.kernel.org/stable/c/7f8eca87fef7519e9c41f3258f25ebc2752247ee"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b7f7866932466332a2528fda099000b035303485",
          "url": "https://git.kernel.org/stable/c/b7f7866932466332a2528fda099000b035303485"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cb09afa0948d96b1e385d609ed044bb1aa043536",
          "url": "https://git.kernel.org/stable/c/cb09afa0948d96b1e385d609ed044bb1aa043536"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ef93a685e01a281b5e2a25ce4e3428cf9371a205",
          "url": "https://git.kernel.org/stable/c/ef93a685e01a281b5e2a25ce4e3428cf9371a205"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-07T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39689",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Also allocate and copy hash for reading of filter files\n\nCurrently the reader of set_ftrace_filter and set_ftrace_notrace just adds\nthe pointer to the global tracer hash to its iterator. Unlike the writer\nthat allocates a copy of the hash, the reader keeps the pointer to the\nfilter hashes. This is problematic because this pointer is static across\nfunction calls that release the locks that can update the global tracer\nhashes. This can cause UAF and similar bugs.\n\nAllocate and copy the hash for reading the filter files like it is done\nfor the writers. This not only fixes UAF bugs, but also makes the code a\nbit simpler as it doesn't have to differentiate when to free the\niterator's hash between writers and readers.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39689"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/12064e1880fc9202be75ff668205b1703d92f74f",
          "url": "https://git.kernel.org/stable/c/12064e1880fc9202be75ff668205b1703d92f74f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3b114a3282ab1a12cb4618a8f45db5d7185e784a",
          "url": "https://git.kernel.org/stable/c/3b114a3282ab1a12cb4618a8f45db5d7185e784a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/64db338140d2bad99a0a8c6a118dd60b3e1fb8cb",
          "url": "https://git.kernel.org/stable/c/64db338140d2bad99a0a8c6a118dd60b3e1fb8cb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a40c69f4f1ed96acbcd62e9b5ff3a596f0a91309",
          "url": "https://git.kernel.org/stable/c/a40c69f4f1ed96acbcd62e9b5ff3a596f0a91309"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bfb336cf97df7b37b2b2edec0f69773e06d11955",
          "url": "https://git.kernel.org/stable/c/bfb336cf97df7b37b2b2edec0f69773e06d11955"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c4cd93811e038d19f961985735ef7bb128078dfb",
          "url": "https://git.kernel.org/stable/c/c4cd93811e038d19f961985735ef7bb128078dfb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c591ba1acd081d4980713e47869dd1cc3d963d19",
          "url": "https://git.kernel.org/stable/c/c591ba1acd081d4980713e47869dd1cc3d963d19"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e0b6b223167e1edde5c82edf38e393c06eda1f13",
          "url": "https://git.kernel.org/stable/c/e0b6b223167e1edde5c82edf38e393c06eda1f13"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-05T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38377",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrose: fix dangling neighbour pointers in rose_rt_device_down()\n\nThere are two bugs in rose_rt_device_down() that can cause\nuse-after-free:\n\n1. The loop bound `t->count` is modified within the loop, which can\n   cause the loop to terminate early and miss some entries.\n\n2. When removing an entry from the neighbour array, the subsequent entries\n   are moved up to fill the gap, but the loop index `i` is still\n   incremented, causing the next entry to be skipped.\n\nFor example, if a node has three neighbours (A, A, B) with count=3 and A\nis being removed, the second A is not checked.\n\n    i=0: (A, A, B) -> (A, B) with count=2\n          ^ checked\n    i=1: (A, B)    -> (A, B) with count=2\n             ^ checked (B, not A!)\n    i=2: (doesn't occur because i < count is false)\n\nThis leaves the second A in the array with count=2, but the rose_neigh\nstructure has been freed. Code that accesses these entries assumes that\nthe first `count` entries are valid pointers, causing a use-after-free\nwhen it accesses the dangling pointer.\n\nFix both issues by iterating over the array in reverse order with a fixed\nloop bound. This ensures that all entries are examined and that the removal\nof an entry doesn't affect subsequent iterations.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38377"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2b952dbb32fef835756f07ff0cd77efbb836dfea",
          "url": "https://git.kernel.org/stable/c/2b952dbb32fef835756f07ff0cd77efbb836dfea"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2c6c82ee074bfcfd1bc978ec45bfea37703d840a",
          "url": "https://git.kernel.org/stable/c/2c6c82ee074bfcfd1bc978ec45bfea37703d840a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/34a500caf48c47d5171f4aa1f237da39b07c6157",
          "url": "https://git.kernel.org/stable/c/34a500caf48c47d5171f4aa1f237da39b07c6157"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/446ac00b86be1670838e513b643933d78837d8db",
          "url": "https://git.kernel.org/stable/c/446ac00b86be1670838e513b643933d78837d8db"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7a1841c9609377e989ec41c16551309ce79c39e4",
          "url": "https://git.kernel.org/stable/c/7a1841c9609377e989ec41c16551309ce79c39e4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/94e0918e39039c47ddceb609500817f7266be756",
          "url": "https://git.kernel.org/stable/c/94e0918e39039c47ddceb609500817f7266be756"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b6b232e16e08c6dc120672b4753392df0d28c1b4",
          "url": "https://git.kernel.org/stable/c/b6b232e16e08c6dc120672b4753392df0d28c1b4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fe62a35fb1f77f494ed534fc69a9043dc5a30ce1",
          "url": "https://git.kernel.org/stable/c/fe62a35fb1f77f494ed534fc69a9043dc5a30ce1"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-25T13:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53454",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: multitouch: Correct devm device reference for hidinput input_dev name\n\nReference the HID device rather than the input device for the devm\nallocation of the input_dev name. Referencing the input_dev would lead to a\nuse-after-free when the input_dev was unregistered and subsequently fires a\nuevent that depends on the name. At the point of firing the uevent, the\nname would be freed by devres management.\n\nUse devm_kasprintf to simplify the logic for allocating memory and\nformatting the input_dev name string.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53454"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/15ec7cb55e7d88755aa01d44a7a1015a42bfce86",
          "url": "https://git.kernel.org/stable/c/15ec7cb55e7d88755aa01d44a7a1015a42bfce86"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1d7833db9fd118415dace2ca157bfa603dec9c8c",
          "url": "https://git.kernel.org/stable/c/1d7833db9fd118415dace2ca157bfa603dec9c8c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2763732ec1e68910719c75b6b896e11b6d3d622b",
          "url": "https://git.kernel.org/stable/c/2763732ec1e68910719c75b6b896e11b6d3d622b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/39c70c19456e50dcb3abfe53539220dff0490f1d",
          "url": "https://git.kernel.org/stable/c/39c70c19456e50dcb3abfe53539220dff0490f1d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4794394635293a3e74591351fff469cea7ad15a2",
          "url": "https://git.kernel.org/stable/c/4794394635293a3e74591351fff469cea7ad15a2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ac0d389402a6ff9ad92cea02c2d8c711483b91ab",
          "url": "https://git.kernel.org/stable/c/ac0d389402a6ff9ad92cea02c2d8c711483b91ab"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b70ac7849248ec8128fa12f86e3655ba38838f29",
          "url": "https://git.kernel.org/stable/c/b70ac7849248ec8128fa12f86e3655ba38838f29"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dde88ab4e45beb60b217026207aa9c14c88d71ab",
          "url": "https://git.kernel.org/stable/c/dde88ab4e45beb60b217026207aa9c14c88d71ab"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/df7ca43fe090e1a56c216c8ebc106ef5fd49afc6",
          "url": "https://git.kernel.org/stable/c/df7ca43fe090e1a56c216c8ebc106ef5fd49afc6"
        }
      ],
      "release_date": "2025-10-01T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39911",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path\n\nIf request_irq() in i40e_vsi_request_irq_msix() fails in an iteration\nlater than the first, the error path wants to free the IRQs requested\nso far. However, it uses the wrong dev_id argument for free_irq(), so\nit does not free the IRQs correctly and instead triggers the warning:\n\n Trying to free already-free IRQ 173\n WARNING: CPU: 25 PID: 1091 at kernel/irq/manage.c:1829 __free_irq+0x192/0x2c0\n Modules linked in: i40e(+) [...]\n CPU: 25 UID: 0 PID: 1091 Comm: NetworkManager Not tainted 6.17.0-rc1+ #1 PREEMPT(lazy)\n Hardware name: [...]\n RIP: 0010:__free_irq+0x192/0x2c0\n [...]\n Call Trace:\n  <TASK>\n  free_irq+0x32/0x70\n  i40e_vsi_request_irq_msix.cold+0x63/0x8b [i40e]\n  i40e_vsi_request_irq+0x79/0x80 [i40e]\n  i40e_vsi_open+0x21f/0x2f0 [i40e]\n  i40e_open+0x63/0x130 [i40e]\n  __dev_open+0xfc/0x210\n  __dev_change_flags+0x1fc/0x240\n  netif_change_flags+0x27/0x70\n  do_setlink.isra.0+0x341/0xc70\n  rtnl_newlink+0x468/0x860\n  rtnetlink_rcv_msg+0x375/0x450\n  netlink_rcv_skb+0x5c/0x110\n  netlink_unicast+0x288/0x3c0\n  netlink_sendmsg+0x20d/0x430\n  ____sys_sendmsg+0x3a2/0x3d0\n  ___sys_sendmsg+0x99/0xe0\n  __sys_sendmsg+0x8a/0xf0\n  do_syscall_64+0x82/0x2c0\n  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n  [...]\n  </TASK>\n ---[ end trace 0000000000000000 ]---\n\nUse the same dev_id for free_irq() as for request_irq().\n\nI tested this with inserting code to fail intentionally.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39911"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/13ab9adef3cd386511c930a9660ae06595007f89",
          "url": "https://git.kernel.org/stable/c/13ab9adef3cd386511c930a9660ae06595007f89"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/23431998a37764c464737b855c71a81d50992e98",
          "url": "https://git.kernel.org/stable/c/23431998a37764c464737b855c71a81d50992e98"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6e4016c0dca53afc71e3b99e24252b63417395df",
          "url": "https://git.kernel.org/stable/c/6e4016c0dca53afc71e3b99e24252b63417395df"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/915470e1b44e71d1dd07ee067276f003c3521ee3",
          "url": "https://git.kernel.org/stable/c/915470e1b44e71d1dd07ee067276f003c3521ee3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a30afd6617c30aaa338d1dbcb1e34e7a1890085c",
          "url": "https://git.kernel.org/stable/c/a30afd6617c30aaa338d1dbcb1e34e7a1890085c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b905b2acb3a0bbb08ad9be9984d8cdabdf827315",
          "url": "https://git.kernel.org/stable/c/b905b2acb3a0bbb08ad9be9984d8cdabdf827315"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b9721a023df38cf44a88f2739b4cf51efd051f85",
          "url": "https://git.kernel.org/stable/c/b9721a023df38cf44a88f2739b4cf51efd051f85"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c62580674ce5feb1be4f90b5873ff3ce50e0a1db",
          "url": "https://git.kernel.org/stable/c/c62580674ce5feb1be4f90b5873ff3ce50e0a1db"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-10-01T08:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53622",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngfs2: Fix possible data races in gfs2_show_options()\n\nSome fields such as gt_logd_secs of the struct gfs2_tune are accessed\nwithout holding the lock gt_spin in gfs2_show_options():\n\n  val = sdp->sd_tune.gt_logd_secs;\n  if (val != 30)\n    seq_printf(s, \",commit=%d\", val);\n\nAnd thus can cause data races when gfs2_show_options() and other functions\nsuch as gfs2_reconfigure() are concurrently executed:\n\n  spin_lock(&gt->gt_spin);\n  gt->gt_logd_secs = newargs->ar_commit;\n\nTo fix these possible data races, the lock sdp->sd_tune.gt_spin is\nacquired before accessing the fields of gfs2_tune and released after these\naccesses.\n\nFurther changes by Andreas:\n\n- Don't hold the spin lock over the seq_printf operations.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53622"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/235a5ae73cea29109a3e06f100493f17857e6a93",
          "url": "https://git.kernel.org/stable/c/235a5ae73cea29109a3e06f100493f17857e6a93"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/42077d4de49e4d9c773c97c42d5383b4899a8f9d",
          "url": "https://git.kernel.org/stable/c/42077d4de49e4d9c773c97c42d5383b4899a8f9d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6fa0a72cbbe45db4ed967a51f9e6f4e3afe61d20",
          "url": "https://git.kernel.org/stable/c/6fa0a72cbbe45db4ed967a51f9e6f4e3afe61d20"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7c5b2649f6a37d45bfb7abf34c9b71d08677139f",
          "url": "https://git.kernel.org/stable/c/7c5b2649f6a37d45bfb7abf34c9b71d08677139f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7e5bbeb7eb813bb2568e1d5d02587df943272e57",
          "url": "https://git.kernel.org/stable/c/7e5bbeb7eb813bb2568e1d5d02587df943272e57"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/85e888150075cb221270b64bf772341fc6bd11d9",
          "url": "https://git.kernel.org/stable/c/85e888150075cb221270b64bf772341fc6bd11d9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a4f71523ed2123d63b431cc0cea4e9f363a0f054",
          "url": "https://git.kernel.org/stable/c/a4f71523ed2123d63b431cc0cea4e9f363a0f054"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b4a7ab57effbed42624842f2ab2a49b177c21a47",
          "url": "https://git.kernel.org/stable/c/b4a7ab57effbed42624842f2ab2a49b177c21a47"
        }
      ],
      "release_date": "2025-10-07T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39797",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm: Duplicate SPI Handling\n\nThe issue originates when Strongswan initiates an XFRM_MSG_ALLOCSPI\nNetlink message, which triggers the kernel function xfrm_alloc_spi().\nThis function is expected to ensure uniqueness of the Security Parameter\nIndex (SPI) for inbound Security Associations (SAs). However, it can\nreturn success even when the requested SPI is already in use, leading\nto duplicate SPIs assigned to multiple inbound SAs, differentiated\nonly by their destination addresses.\n\nThis behavior causes inconsistencies during SPI lookups for inbound packets.\nSince the lookup may return an arbitrary SA among those with the same SPI,\npacket processing can fail, resulting in packet drops.\n\nAccording to RFC 4301 section 4.4.2 , for inbound processing a unicast SA\nis uniquely identified by the SPI and optionally protocol.\n\nReproducing the Issue Reliably:\nTo consistently reproduce the problem, restrict the available SPI range in\ncharon.conf : spi_min = 0x10000000 spi_max = 0x10000002\nThis limits the system to only 2 usable SPI values.\nNext, create more than 2 Child SA. each using unique pair of src/dst address.\nAs soon as the 3rd Child SA is initiated, it will be assigned a duplicate\nSPI, since the SPI pool is already exhausted.\nWith a narrow SPI range, the issue is consistently reproducible.\nWith a broader/default range, it becomes rare and unpredictable.\n\nCurrent implementation:\nxfrm_spi_hash() lookup function computes hash using daddr, proto, and family.\nSo if two SAs have the same SPI but different destination addresses, then\nthey will:\na. Hash into different buckets\nb. Be stored in different linked lists (byspi + h)\nc. Not be seen in the same hlist_for_each_entry_rcu() iteration.\nAs a result, the lookup will result in NULL and kernel allows that Duplicate SPI\n\nProposed Change:\nxfrm_state_lookup_spi_proto() does a truly global search - across all states,\nregardless of hash bucket and matches SPI and proto.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39797"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/29e9158f91f99057dbd35db5e8674d93b38549fe",
          "url": "https://git.kernel.org/stable/c/29e9158f91f99057dbd35db5e8674d93b38549fe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2fc5b54368a1bf1d2d74b4d3b8eea5309a653e38",
          "url": "https://git.kernel.org/stable/c/2fc5b54368a1bf1d2d74b4d3b8eea5309a653e38"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3d8090bb53424432fa788fe9a49e8ceca74f0544",
          "url": "https://git.kernel.org/stable/c/3d8090bb53424432fa788fe9a49e8ceca74f0544"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/94f39804d891cffe4ce17737d295f3b195bc7299",
          "url": "https://git.kernel.org/stable/c/94f39804d891cffe4ce17737d295f3b195bc7299"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c67d4e7a8f90fb6361ca89d4d5c9a28f4e935e47",
          "url": "https://git.kernel.org/stable/c/c67d4e7a8f90fb6361ca89d4d5c9a28f4e935e47"
        }
      ],
      "release_date": "2025-09-12T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53215",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/fair: Don't balance task to its current running CPU\n\nWe've run into the case that the balancer tries to balance a migration\ndisabled task and trigger the warning in set_task_cpu() like below:\n\n ------------[ cut here ]------------\n WARNING: CPU: 7 PID: 0 at kernel/sched/core.c:3115 set_task_cpu+0x188/0x240\n Modules linked in: hclgevf xt_CHECKSUM ipt_REJECT nf_reject_ipv4 <...snip>\n CPU: 7 PID: 0 Comm: swapper/7 Kdump: loaded Tainted: G           O       6.1.0-rc4+ #1\n Hardware name: Huawei TaiShan 2280 V2/BC82AMDC, BIOS 2280-V2 CS V5.B221.01 12/09/2021\n pstate: 604000c9 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : set_task_cpu+0x188/0x240\n lr : load_balance+0x5d0/0xc60\n sp : ffff80000803bc70\n x29: ffff80000803bc70 x28: ffff004089e190e8 x27: ffff004089e19040\n x26: ffff007effcabc38 x25: 0000000000000000 x24: 0000000000000001\n x23: ffff80000803be84 x22: 000000000000000c x21: ffffb093e79e2a78\n x20: 000000000000000c x19: ffff004089e19040 x18: 0000000000000000\n x17: 0000000000001fad x16: 0000000000000030 x15: 0000000000000000\n x14: 0000000000000003 x13: 0000000000000000 x12: 0000000000000000\n x11: 0000000000000001 x10: 0000000000000400 x9 : ffffb093e4cee530\n x8 : 00000000fffffffe x7 : 0000000000ce168a x6 : 000000000000013e\n x5 : 00000000ffffffe1 x4 : 0000000000000001 x3 : 0000000000000b2a\n x2 : 0000000000000b2a x1 : ffffb093e6d6c510 x0 : 0000000000000001\n Call trace:\n  set_task_cpu+0x188/0x240\n  load_balance+0x5d0/0xc60\n  rebalance_domains+0x26c/0x380\n  _nohz_idle_balance.isra.0+0x1e0/0x370\n  run_rebalance_domains+0x6c/0x80\n  __do_softirq+0x128/0x3d8\n  ____do_softirq+0x18/0x24\n  call_on_irq_stack+0x2c/0x38\n  do_softirq_own_stack+0x24/0x3c\n  __irq_exit_rcu+0xcc/0xf4\n  irq_exit_rcu+0x18/0x24\n  el1_interrupt+0x4c/0xe4\n  el1h_64_irq_handler+0x18/0x2c\n  el1h_64_irq+0x74/0x78\n  arch_cpu_idle+0x18/0x4c\n  default_idle_call+0x58/0x194\n  do_idle+0x244/0x2b0\n  cpu_startup_entry+0x30/0x3c\n  secondary_start_kernel+0x14c/0x190\n  __secondary_switched+0xb0/0xb4\n ---[ end trace 0000000000000000 ]---\n\nFurther investigation shows that the warning is superfluous, the migration\ndisabled task is just going to be migrated to its current running CPU.\nThis is because that on load balance if the dst_cpu is not allowed by the\ntask, we'll re-select a new_dst_cpu as a candidate. If no task can be\nbalanced to dst_cpu we'll try to balance the task to the new_dst_cpu\ninstead. In this case when the migration disabled task is not on CPU it\nonly allows to run on its current CPU, load balance will select its\ncurrent CPU as new_dst_cpu and later triggers the warning above.\n\nThe new_dst_cpu is chosen from the env->dst_grpmask. Currently it\ncontains CPUs in sched_group_span() and if we have overlapped groups it's\npossible to run into this case. This patch makes env->dst_grpmask of\ngroup_balance_mask() which exclude any CPUs from the busiest group and\nsolve the issue. For balancing in a domain with no overlapped groups\nthe behaviour keeps same as before.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53215"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de",
          "url": "https://git.kernel.org/stable/c/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54",
          "url": "https://git.kernel.org/stable/c/32d937f94b7805d4c9028b8727a7d6241547da54"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15",
          "url": "https://git.kernel.org/stable/c/34eb902050d473bb2befa15714fb1d30a0991c15"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd",
          "url": "https://git.kernel.org/stable/c/3cb43222bab8ab328fc91ed30899b3df2efbccfd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68",
          "url": "https://git.kernel.org/stable/c/6b0c79aa33075b34c3cdcea4132c0afb3fc42d68"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc",
          "url": "https://git.kernel.org/stable/c/78a5f711efceb37e32c48cd6b40addb671fea9cc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab",
          "url": "https://git.kernel.org/stable/c/a5286f4655ce2fa28f477c0b957ea7f323fe2fab"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1",
          "url": "https://git.kernel.org/stable/c/cec1857b1ea5cc3ea2b600564f1c95d1a6f27ad1"
        }
      ],
      "release_date": "2025-09-15T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-21727",
      "cwe": {
        "id": "CWE-820",
        "name": "Missing Synchronization"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\npadata: fix UAF in padata_reorder\nA bug was found when run ltp test:\nBUG: KASAN: slab-use-after-free in padata_find_next+0x29/0x1a0\nRead of size 4 at addr ffff88bbfe003524 by task kworker/u113:2/3039206\nCPU: 0 PID: 3039206 Comm: kworker/u113:2 Kdump: loaded Not tainted 6.6.0+\nWorkqueue: pdecrypt_parallel padata_parallel_worker\nCall Trace:\n<TASK>\ndump_stack_lvl+0x32/0x50\nprint_address_description.constprop.0+0x6b/0x3d0\nprint_report+0xdd/0x2c0\nkasan_report+0xa5/0xd0\npadata_find_next+0x29/0x1a0\npadata_reorder+0x131/0x220\npadata_parallel_worker+0x3d/0xc0\nprocess_one_work+0x2ec/0x5a0\nIf 'mdelay(10)' is added before calling 'padata_find_next' in the\n'padata_reorder' function, this issue could be reproduced easily with\nltp test (pcrypt_aead01).\nThis can be explained as bellow:\npcrypt_aead_encrypt\n...\npadata_do_parallel\nrefcount_inc(&pd->refcnt); // add refcnt\n...\npadata_do_serial\npadata_reorder // pd\nwhile (1) {\npadata_find_next(pd, true); // using pd\nqueue_work_on\n...\npadata_serial_workercrypto_del_alg\npadata_put_pd_cnt // sub refcnt\npadata_free_shell\npadata_put_pd(ps->pd);\n// pd is freed\n// loop again, but pd is freed\n// call padata_find_next, UAF\n}\nIn the padata_reorder function, when it loops in 'while', if the alg is\ndeleted, the refcnt may be decreased to 0 before entering\n'padata_find_next', which leads to UAF.\nAs mentioned in [1], do_serial is supposed to be called with BHs disabled\nand always happen under RCU protection, to address this issue, add\nsynchronize_rcu() in 'padata_free_shell' wait for all _do_serial calls\nto finish.\n[1] https://lore.kernel.org/all/20221028160401.cccypv4euxikusiq@parnassus.localdomain/\n[2] https://lore.kernel.org/linux-kernel/jfjz5d7zwbytztackem7ibzalm5lnxldi2eofeiczqmqs2m7o6@fq426cwnjtkm/",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-21727"
        }
      ],
      "release_date": "2025-02-27T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-21726",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\npadata: avoid UAF for reorder_work\nAlthough the previous patch can avoid ps and ps UAF for _do_serial, it\ncan not avoid potential UAF issue for reorder_work. This issue can\nhappen just as below:\ncrypto_requestcrypto_requestcrypto_del_alg\npadata_do_serial\n...\npadata_reorder\n// processes all remaining\n// requests then breaks\nwhile (1) {\nif (!padata)\nbreak;\n...\n}\npadata_do_serial\n// new request added\nlist_add\n// sees the new request\nqueue_work(reorder_work)\npadata_reorder\nqueue_work_on(squeue->work)\n...\n<kworker context>\npadata_serial_worker\n// completes new request,\n// no more outstanding\n// requests\ncrypto_del_alg\n// free pd\n<kworker context>\ninvoke_padata_reorder\n// UAF of pd\nTo avoid UAF for 'reorder_work', get 'pd' ref before put 'reorder_work'\ninto the 'serial_wq' and put 'pd' ref until the 'serial_wq' finish.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-21726"
        }
      ],
      "release_date": "2025-02-27T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53035",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix kernel-infoleak in nilfs_ioctl_wrap_copy()\n\nThe ioctl helper function nilfs_ioctl_wrap_copy(), which exchanges a\nmetadata array to/from user space, may copy uninitialized buffer regions\nto user space memory for read-only ioctl commands NILFS_IOCTL_GET_SUINFO\nand NILFS_IOCTL_GET_CPINFO.\n\nThis can occur when the element size of the user space metadata given by\nthe v_size member of the argument nilfs_argv structure is larger than the\nsize of the metadata element (nilfs_suinfo structure or nilfs_cpinfo\nstructure) on the file system side.\n\nKMSAN-enabled kernels detect this issue as follows:\n\n BUG: KMSAN: kernel-infoleak in instrument_copy_to_user\n include/linux/instrumented.h:121 [inline]\n BUG: KMSAN: kernel-infoleak in _copy_to_user+0xc0/0x100 lib/usercopy.c:33\n  instrument_copy_to_user include/linux/instrumented.h:121 [inline]\n  _copy_to_user+0xc0/0x100 lib/usercopy.c:33\n  copy_to_user include/linux/uaccess.h:169 [inline]\n  nilfs_ioctl_wrap_copy+0x6fa/0xc10 fs/nilfs2/ioctl.c:99\n  nilfs_ioctl_get_info fs/nilfs2/ioctl.c:1173 [inline]\n  nilfs_ioctl+0x2402/0x4450 fs/nilfs2/ioctl.c:1290\n  nilfs_compat_ioctl+0x1b8/0x200 fs/nilfs2/ioctl.c:1343\n  __do_compat_sys_ioctl fs/ioctl.c:968 [inline]\n  __se_compat_sys_ioctl+0x7dd/0x1000 fs/ioctl.c:910\n  __ia32_compat_sys_ioctl+0x93/0xd0 fs/ioctl.c:910\n  do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline]\n  __do_fast_syscall_32+0xa2/0x100 arch/x86/entry/common.c:178\n  do_fast_syscall_32+0x37/0x80 arch/x86/entry/common.c:203\n  do_SYSENTER_32+0x1f/0x30 arch/x86/entry/common.c:246\n  entry_SYSENTER_compat_after_hwframe+0x70/0x82\n\n Uninit was created at:\n  __alloc_pages+0x9f6/0xe90 mm/page_alloc.c:5572\n  alloc_pages+0xab0/0xd80 mm/mempolicy.c:2287\n  __get_free_pages+0x34/0xc0 mm/page_alloc.c:5599\n  nilfs_ioctl_wrap_copy+0x223/0xc10 fs/nilfs2/ioctl.c:74\n  nilfs_ioctl_get_info fs/nilfs2/ioctl.c:1173 [inline]\n  nilfs_ioctl+0x2402/0x4450 fs/nilfs2/ioctl.c:1290\n  nilfs_compat_ioctl+0x1b8/0x200 fs/nilfs2/ioctl.c:1343\n  __do_compat_sys_ioctl fs/ioctl.c:968 [inline]\n  __se_compat_sys_ioctl+0x7dd/0x1000 fs/ioctl.c:910\n  __ia32_compat_sys_ioctl+0x93/0xd0 fs/ioctl.c:910\n  do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline]\n  __do_fast_syscall_32+0xa2/0x100 arch/x86/entry/common.c:178\n  do_fast_syscall_32+0x37/0x80 arch/x86/entry/common.c:203\n  do_SYSENTER_32+0x1f/0x30 arch/x86/entry/common.c:246\n  entry_SYSENTER_compat_after_hwframe+0x70/0x82\n\n Bytes 16-127 of 3968 are uninitialized\n ...\n\nThis eliminates the leak issue by initializing the page allocated as\nbuffer using get_zeroed_page().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53035"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/003587000276f81d0114b5ce773d80c119d8cb30",
          "url": "https://git.kernel.org/stable/c/003587000276f81d0114b5ce773d80c119d8cb30"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5bb105cc72beb9d51bf12f5c657336d2d35bdc5d",
          "url": "https://git.kernel.org/stable/c/5bb105cc72beb9d51bf12f5c657336d2d35bdc5d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5f33b042f74fc9662eba17f4cd19b07d84bbc6c5",
          "url": "https://git.kernel.org/stable/c/5f33b042f74fc9662eba17f4cd19b07d84bbc6c5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8a6550b365c0ce2e65905de57dcbfe1f7d629726",
          "url": "https://git.kernel.org/stable/c/8a6550b365c0ce2e65905de57dcbfe1f7d629726"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8f5cbf6a8c0e19b062b829c5b7aca01468bb57f6",
          "url": "https://git.kernel.org/stable/c/8f5cbf6a8c0e19b062b829c5b7aca01468bb57f6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9c5034e9a0e03db8d5e9eabb176340259b5b97e4",
          "url": "https://git.kernel.org/stable/c/9c5034e9a0e03db8d5e9eabb176340259b5b97e4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a94932381e8dae4117e9129b3c1282e18aa97b05",
          "url": "https://git.kernel.org/stable/c/a94932381e8dae4117e9129b3c1282e18aa97b05"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d18db946cc6a394291539e030df32324285648f7",
          "url": "https://git.kernel.org/stable/c/d18db946cc6a394291539e030df32324285648f7"
        }
      ],
      "release_date": "2025-05-02T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39883",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory\n\nWhen I did memory failure tests, below panic occurs:\n\npage dumped because: VM_BUG_ON_PAGE(PagePoisoned(page))\nkernel BUG at include/linux/page-flags.h:616!\nOops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\nCPU: 3 PID: 720 Comm: bash Not tainted 6.10.0-rc1-00195-g148743902568 #40\nRIP: 0010:unpoison_memory+0x2f3/0x590\nRSP: 0018:ffffa57fc8787d60 EFLAGS: 00000246\nRAX: 0000000000000037 RBX: 0000000000000009 RCX: ffff9be25fcdc9c8\nRDX: 0000000000000000 RSI: 0000000000000027 RDI: ffff9be25fcdc9c0\nRBP: 0000000000300000 R08: ffffffffb4956f88 R09: 0000000000009ffb\nR10: 0000000000000284 R11: ffffffffb4926fa0 R12: ffffe6b00c000000\nR13: ffff9bdb453dfd00 R14: 0000000000000000 R15: fffffffffffffffe\nFS:  00007f08f04e4740(0000) GS:ffff9be25fcc0000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000564787a30410 CR3: 000000010d4e2000 CR4: 00000000000006f0\nCall Trace:\n <TASK>\n unpoison_memory+0x2f3/0x590\n simple_attr_write_xsigned.constprop.0.isra.0+0xb3/0x110\n debugfs_attr_write+0x42/0x60\n full_proxy_write+0x5b/0x80\n vfs_write+0xd5/0x540\n ksys_write+0x64/0xe0\n do_syscall_64+0xb9/0x1d0\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f08f0314887\nRSP: 002b:00007ffece710078 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\nRAX: ffffffffffffffda RBX: 0000000000000009 RCX: 00007f08f0314887\nRDX: 0000000000000009 RSI: 0000564787a30410 RDI: 0000000000000001\nRBP: 0000564787a30410 R08: 000000000000fefe R09: 000000007fffffff\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009\nR13: 00007f08f041b780 R14: 00007f08f0417600 R15: 00007f08f0416a00\n </TASK>\nModules linked in: hwpoison_inject\n---[ end trace 0000000000000000 ]---\nRIP: 0010:unpoison_memory+0x2f3/0x590\nRSP: 0018:ffffa57fc8787d60 EFLAGS: 00000246\nRAX: 0000000000000037 RBX: 0000000000000009 RCX: ffff9be25fcdc9c8\nRDX: 0000000000000000 RSI: 0000000000000027 RDI: ffff9be25fcdc9c0\nRBP: 0000000000300000 R08: ffffffffb4956f88 R09: 0000000000009ffb\nR10: 0000000000000284 R11: ffffffffb4926fa0 R12: ffffe6b00c000000\nR13: ffff9bdb453dfd00 R14: 0000000000000000 R15: fffffffffffffffe\nFS:  00007f08f04e4740(0000) GS:ffff9be25fcc0000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000564787a30410 CR3: 000000010d4e2000 CR4: 00000000000006f0\nKernel panic - not syncing: Fatal exception\nKernel Offset: 0x31c00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)\n---[ end Kernel panic - not syncing: Fatal exception ]---\n\nThe root cause is that unpoison_memory() tries to check the PG_HWPoison\nflags of an uninitialized page.  So VM_BUG_ON_PAGE(PagePoisoned(page)) is\ntriggered.  This can be reproduced by below steps:\n\n1.Offline memory block:\n\n echo offline > /sys/devices/system/memory/memory12/state\n\n2.Get offlined memory pfn:\n\n page-types -b n -rlN\n\n3.Write pfn to unpoison-pfn\n\n echo <pfn> > /sys/kernel/debug/hwpoison/unpoison-pfn\n\nThis scenario can be identified by pfn_to_online_page() returning NULL. \nAnd ZONE_DEVICE pages are never expected, so we can simply fail if\npfn_to_online_page() == NULL to fix the bug.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39883"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3d278e89c2ea62b1aaa4b0d8a9766a35b3a3164a",
          "url": "https://git.kernel.org/stable/c/3d278e89c2ea62b1aaa4b0d8a9766a35b3a3164a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/63a327a2375a8ce7a47dec5aaa4d8a9ae0a00b96",
          "url": "https://git.kernel.org/stable/c/63a327a2375a8ce7a47dec5aaa4d8a9ae0a00b96"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7618fd443aa4cfa553a64cacf5721581653ee7b0",
          "url": "https://git.kernel.org/stable/c/7618fd443aa4cfa553a64cacf5721581653ee7b0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8e01ea186a52c90694c08a9ff57bea1b0e78256a",
          "url": "https://git.kernel.org/stable/c/8e01ea186a52c90694c08a9ff57bea1b0e78256a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/99f7048957f5ae3cee1c01189147e73a9a96de02",
          "url": "https://git.kernel.org/stable/c/99f7048957f5ae3cee1c01189147e73a9a96de02"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d613f53c83ec47089c4e25859d5e8e0359f6f8da",
          "url": "https://git.kernel.org/stable/c/d613f53c83ec47089c4e25859d5e8e0359f6f8da"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e4ec6def5643a1c9511115b3884eb879572294c6",
          "url": "https://git.kernel.org/stable/c/e4ec6def5643a1c9511115b3884eb879572294c6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fb65803ccff37cf9123c50c1c02efd1ed73c4ed5",
          "url": "https://git.kernel.org/stable/c/fb65803ccff37cf9123c50c1c02efd1ed73c4ed5"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-23T06:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53148",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigb: Fix igb_down hung on surprise removal\n\nIn a setup where a Thunderbolt hub connects to Ethernet and a display\nthrough USB Type-C, users may experience a hung task timeout when they\nremove the cable between the PC and the Thunderbolt hub.\nThis is because the igb_down function is called multiple times when\nthe Thunderbolt hub is unplugged. For example, the igb_io_error_detected\ntriggers the first call, and the igb_remove triggers the second call.\nThe second call to igb_down will block at napi_synchronize.\nHere's the call trace:\n    __schedule+0x3b0/0xddb\n    ? __mod_timer+0x164/0x5d3\n    schedule+0x44/0xa8\n    schedule_timeout+0xb2/0x2a4\n    ? run_local_timers+0x4e/0x4e\n    msleep+0x31/0x38\n    igb_down+0x12c/0x22a [igb 6615058754948bfde0bf01429257eb59f13030d4]\n    __igb_close+0x6f/0x9c [igb 6615058754948bfde0bf01429257eb59f13030d4]\n    igb_close+0x23/0x2b [igb 6615058754948bfde0bf01429257eb59f13030d4]\n    __dev_close_many+0x95/0xec\n    dev_close_many+0x6e/0x103\n    unregister_netdevice_many+0x105/0x5b1\n    unregister_netdevice_queue+0xc2/0x10d\n    unregister_netdev+0x1c/0x23\n    igb_remove+0xa7/0x11c [igb 6615058754948bfde0bf01429257eb59f13030d4]\n    pci_device_remove+0x3f/0x9c\n    device_release_driver_internal+0xfe/0x1b4\n    pci_stop_bus_device+0x5b/0x7f\n    pci_stop_bus_device+0x30/0x7f\n    pci_stop_bus_device+0x30/0x7f\n    pci_stop_and_remove_bus_device+0x12/0x19\n    pciehp_unconfigure_device+0x76/0xe9\n    pciehp_disable_slot+0x6e/0x131\n    pciehp_handle_presence_or_link_change+0x7a/0x3f7\n    pciehp_ist+0xbe/0x194\n    irq_thread_fn+0x22/0x4d\n    ? irq_thread+0x1fd/0x1fd\n    irq_thread+0x17b/0x1fd\n    ? irq_forced_thread_fn+0x5f/0x5f\n    kthread+0x142/0x153\n    ? __irq_get_irqchip_state+0x46/0x46\n    ? kthread_associate_blkcg+0x71/0x71\n    ret_from_fork+0x1f/0x30\n\nIn this case, igb_io_error_detected detaches the network interface\nand requests a PCIE slot reset, however, the PCIE reset callback is\nnot being invoked and thus the Ethernet connection breaks down.\nAs the PCIE error in this case is a non-fatal one, requesting a\nslot reset can be avoided.\nThis patch fixes the task hung issue and preserves Ethernet\nconnection by ignoring non-fatal PCIE errors.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53148"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/004d25060c78fc31f66da0fa439c544dda1ac9d5",
          "url": "https://git.kernel.org/stable/c/004d25060c78fc31f66da0fa439c544dda1ac9d5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/124e39a734cb90658b8f0dc110847bbfc6e33792",
          "url": "https://git.kernel.org/stable/c/124e39a734cb90658b8f0dc110847bbfc6e33792"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/39695e87d86f0e7d897fba1d2559f825aa20caeb",
          "url": "https://git.kernel.org/stable/c/39695e87d86f0e7d897fba1d2559f825aa20caeb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/41f63b72a01c0e0ac59ab83fd2d921fcce0f602d",
          "url": "https://git.kernel.org/stable/c/41f63b72a01c0e0ac59ab83fd2d921fcce0f602d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/994c2ceb70ea99264ccc6f09e6703ca267dad63c",
          "url": "https://git.kernel.org/stable/c/994c2ceb70ea99264ccc6f09e6703ca267dad63c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c2312e1d12b1c3ee4100c173131b102e2aed4d04",
          "url": "https://git.kernel.org/stable/c/c2312e1d12b1c3ee4100c173131b102e2aed4d04"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c9f56f3c7bc908caa772112d3ae71cdd5d18c257",
          "url": "https://git.kernel.org/stable/c/c9f56f3c7bc908caa772112d3ae71cdd5d18c257"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fa92c463eba75dcedbd8d689ffdcb83293aaa0c3",
          "url": "https://git.kernel.org/stable/c/fa92c463eba75dcedbd8d689ffdcb83293aaa0c3"
        }
      ],
      "release_date": "2025-09-15T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39869",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: ti: edma: Fix memory allocation size for queue_priority_map\n\nFix a critical memory allocation bug in edma_setup_from_hw() where\nqueue_priority_map was allocated with insufficient memory. The code\ndeclared queue_priority_map as s8 (*)[2] (pointer to array of 2 s8),\nbut allocated memory using sizeof(s8) instead of the correct size.\n\nThis caused out-of-bounds memory writes when accessing:\n  queue_priority_map[i][0] = i;\n  queue_priority_map[i][1] = i;\n\nThe bug manifested as kernel crashes with \"Oops - undefined instruction\"\non ARM platforms (BeagleBoard-X15) during EDMA driver probe, as the\nmemory corruption triggered kernel hardening features on Clang.\n\nChange the allocation to use sizeof(*queue_priority_map) which\nautomatically gets the correct size for the 2D array structure.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39869"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/069fd1688c57c0cc8a3de64d108579b31676f74b",
          "url": "https://git.kernel.org/stable/c/069fd1688c57c0cc8a3de64d108579b31676f74b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1baed10553fc8b388351d8fc803e3ae6f1a863bc",
          "url": "https://git.kernel.org/stable/c/1baed10553fc8b388351d8fc803e3ae6f1a863bc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/301a96cc4dc006c9a285913d301e681cfbf7edb6",
          "url": "https://git.kernel.org/stable/c/301a96cc4dc006c9a285913d301e681cfbf7edb6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5e462fa0dfdb52b3983cf41532d3d4c7d63e2f93",
          "url": "https://git.kernel.org/stable/c/5e462fa0dfdb52b3983cf41532d3d4c7d63e2f93"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7d4de60d6db02d9b01d5890d5156b04fad65d07a",
          "url": "https://git.kernel.org/stable/c/7d4de60d6db02d9b01d5890d5156b04fad65d07a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d5e82f3f2c918d446df46e8d65f8083fd97cdec5",
          "url": "https://git.kernel.org/stable/c/d5e82f3f2c918d446df46e8d65f8083fd97cdec5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d722de80ce037dccf6931e778f4a46499d51bdf9",
          "url": "https://git.kernel.org/stable/c/d722de80ce037dccf6931e778f4a46499d51bdf9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e63419dbf2ceb083c1651852209c7f048089ac0f",
          "url": "https://git.kernel.org/stable/c/e63419dbf2ceb083c1651852209c7f048089ac0f"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-23T06:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38555",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget : fix use-after-free in composite_dev_cleanup()\n\n1. In func configfs_composite_bind() -> composite_os_desc_req_prepare():\nif kmalloc fails, the pointer cdev->os_desc_req will be freed but not\nset to NULL. Then it will return a failure to the upper-level function.\n2. in func configfs_composite_bind() -> composite_dev_cleanup():\nit will checks whether cdev->os_desc_req is NULL. If it is not NULL, it\nwill attempt to use it.This will lead to a use-after-free issue.\n\nBUG: KASAN: use-after-free in composite_dev_cleanup+0xf4/0x2c0\nRead of size 8 at addr 0000004827837a00 by task init/1\n\nCPU: 10 PID: 1 Comm: init Tainted: G           O      5.10.97-oh #1\n kasan_report+0x188/0x1cc\n __asan_load8+0xb4/0xbc\n composite_dev_cleanup+0xf4/0x2c0\n configfs_composite_bind+0x210/0x7ac\n udc_bind_to_driver+0xb4/0x1ec\n usb_gadget_probe_driver+0xec/0x21c\n gadget_dev_desc_UDC_store+0x264/0x27c",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/151c0aa896c47a4459e07fee7d4843f44c1bb18e",
          "url": "https://git.kernel.org/stable/c/151c0aa896c47a4459e07fee7d4843f44c1bb18e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2db29235e900a084a656dea7e0939b0abb7bb897",
          "url": "https://git.kernel.org/stable/c/2db29235e900a084a656dea7e0939b0abb7bb897"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5f06ee9f9a3665d43133f125c17e5258a13f3963",
          "url": "https://git.kernel.org/stable/c/5f06ee9f9a3665d43133f125c17e5258a13f3963"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8afb22aa063f706f3343707cdfb8cda4d021dd33",
          "url": "https://git.kernel.org/stable/c/8afb22aa063f706f3343707cdfb8cda4d021dd33"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/aada327a9f8028c573636fa60c0abc80fb8135c9",
          "url": "https://git.kernel.org/stable/c/aada327a9f8028c573636fa60c0abc80fb8135c9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bd3c4ef60baf7f65c963f3e12d9d7b2b091e20ba",
          "url": "https://git.kernel.org/stable/c/bd3c4ef60baf7f65c963f3e12d9d7b2b091e20ba"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dba96dfa5a0f685b959dd28a52ac8dab0b805204",
          "url": "https://git.kernel.org/stable/c/dba96dfa5a0f685b959dd28a52ac8dab0b805204"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e1be1f380c82a69f80c68c96a7cfe8759fb30355",
          "url": "https://git.kernel.org/stable/c/e1be1f380c82a69f80c68c96a7cfe8759fb30355"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e624bf26127645a2f7821e73fdf6dc64bad07835",
          "url": "https://git.kernel.org/stable/c/e624bf26127645a2f7821e73fdf6dc64bad07835"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-08-19T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38497",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: configfs: Fix OOB read on empty string write\n\nWhen writing an empty string to either 'qw_sign' or 'landingPage'\nsysfs attributes, the store functions attempt to access page[l - 1]\nbefore validating that the length 'l' is greater than zero.\n\nThis patch fixes the vulnerability by adding a check at the beginning\nof os_desc_qw_sign_store() and webusb_landingPage_store() to handle\nthe zero-length input case gracefully by returning immediately.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38497"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/15a87206879951712915c03c8952a73d6a74721e",
          "url": "https://git.kernel.org/stable/c/15a87206879951712915c03c8952a73d6a74721e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/22b7897c289cc25d99c603f5144096142a30d897",
          "url": "https://git.kernel.org/stable/c/22b7897c289cc25d99c603f5144096142a30d897"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2798111f8e504ac747cce911226135d50b8de468",
          "url": "https://git.kernel.org/stable/c/2798111f8e504ac747cce911226135d50b8de468"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3014168731b7930300aab656085af784edc861f6",
          "url": "https://git.kernel.org/stable/c/3014168731b7930300aab656085af784edc861f6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/58bdd5160184645771553ea732da5c2887fc9bd1",
          "url": "https://git.kernel.org/stable/c/58bdd5160184645771553ea732da5c2887fc9bd1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/783ea37b237a9b524f1e5ca018ea17d772ee0ea0",
          "url": "https://git.kernel.org/stable/c/783ea37b237a9b524f1e5ca018ea17d772ee0ea0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/78b41148cfea2a3f04d87adf3a71b21735820a37",
          "url": "https://git.kernel.org/stable/c/78b41148cfea2a3f04d87adf3a71b21735820a37"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d68b7c8fefbaeae8f065b84e40cf64baf4cc0c76",
          "url": "https://git.kernel.org/stable/c/d68b7c8fefbaeae8f065b84e40cf64baf4cc0c76"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-28T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53000",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetlink: prevent potential spectre v1 gadgets\n\nMost netlink attributes are parsed and validated from\n__nla_validate_parse() or validate_nla()\n\n    u16 type = nla_type(nla);\n\n    if (type == 0 || type > maxtype) {\n        /* error or continue */\n    }\n\n@type is then used as an array index and can be used\nas a Spectre v1 gadget.\n\narray_index_nospec() can be used to prevent leaking\ncontent of kernel memory to malicious users.\n\nThis should take care of vast majority of netlink uses,\nbut an audit is needed to take care of others where\nvalidation is not yet centralized in core netlink functions.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53000"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3e5082b1c66c7783fbcd79b5b178573230e528ff",
          "url": "https://git.kernel.org/stable/c/3e5082b1c66c7783fbcd79b5b178573230e528ff"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/41b74e95f297ac360ca7ed6bf200100717cb6c45",
          "url": "https://git.kernel.org/stable/c/41b74e95f297ac360ca7ed6bf200100717cb6c45"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/539ca5dcbc91134bbe2c45677811c31d8b030d2d",
          "url": "https://git.kernel.org/stable/c/539ca5dcbc91134bbe2c45677811c31d8b030d2d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/992e4ff7116a77968039277b5d6aaa535c2f2184",
          "url": "https://git.kernel.org/stable/c/992e4ff7116a77968039277b5d6aaa535c2f2184"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f0950402e8c76e7dcb08563f1b4e8000fbc62455",
          "url": "https://git.kernel.org/stable/c/f0950402e8c76e7dcb08563f1b4e8000fbc62455"
        }
      ],
      "release_date": "2025-03-27T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53219",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: netup_unidvb: fix use-after-free at del_timer()\n\nWhen Universal DVB card is detaching, netup_unidvb_dma_fini()\nuses del_timer() to stop dma->timeout timer. But when timer\nhandler netup_unidvb_dma_timeout() is running, del_timer()\ncould not stop it. As a result, the use-after-free bug could\nhappen. The process is shown below:\n\n    (cleanup routine)          |        (timer routine)\n                               | mod_timer(&dev->tx_sim_timer, ..)\nnetup_unidvb_finidev()         | (wait a time)\n  netup_unidvb_dma_fini()      | netup_unidvb_dma_timeout()\n    del_timer(&dma->timeout);  |\n                               |   ndev->pci_dev->dev //USE\n\nFix by changing del_timer() to del_timer_sync().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53219"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/051af3f0b7d1cd8ab7f3e2523ad8ae1af44caba3",
          "url": "https://git.kernel.org/stable/c/051af3f0b7d1cd8ab7f3e2523ad8ae1af44caba3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/07821524f67bf920342bc84ae8b3dea2a315a89e",
          "url": "https://git.kernel.org/stable/c/07821524f67bf920342bc84ae8b3dea2a315a89e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0f5bb36bf9b39a2a96e730bf4455095b50713f63",
          "url": "https://git.kernel.org/stable/c/0f5bb36bf9b39a2a96e730bf4455095b50713f63"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1550bcf2983ae1220cc8ab899a39a423fa7cb523",
          "url": "https://git.kernel.org/stable/c/1550bcf2983ae1220cc8ab899a39a423fa7cb523"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/90229e9ee957d4514425e4a4d82c50ab5d57ac4d",
          "url": "https://git.kernel.org/stable/c/90229e9ee957d4514425e4a4d82c50ab5d57ac4d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c8f9c05e1ebcc9c7bc211cc8b74d8fb86a8756fc",
          "url": "https://git.kernel.org/stable/c/c8f9c05e1ebcc9c7bc211cc8b74d8fb86a8756fc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dd5c77814f290b353917df329f36de1472d47154",
          "url": "https://git.kernel.org/stable/c/dd5c77814f290b353917df329f36de1472d47154"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f9982db735a8495eee14267cf193c806b957e942",
          "url": "https://git.kernel.org/stable/c/f9982db735a8495eee14267cf193c806b957e942"
        }
      ],
      "release_date": "2025-09-15T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37927",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid\n\nThere is a string parsing logic error which can lead to an overflow of hid\nor uid buffers. Comparing ACPIID_LEN against a total string length doesn't\ntake into account the lengths of individual hid and uid buffers so the\ncheck is insufficient in some cases. For example if the length of hid\nstring is 4 and the length of the uid string is 260, the length of str\nwill be equal to ACPIID_LEN + 1 but uid string will overflow uid buffer\nwhich size is 256.\n\nThe same applies to the hid string with length 13 and uid string with\nlength 250.\n\nCheck the length of hid and uid strings separately to prevent\nbuffer overflow.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37927"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/10d901a95f8e766e5aa0bb9a983fb41271f64718",
          "url": "https://git.kernel.org/stable/c/10d901a95f8e766e5aa0bb9a983fb41271f64718"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/13d67528e1ae4486e9ab24b70122fab104c73c29",
          "url": "https://git.kernel.org/stable/c/13d67528e1ae4486e9ab24b70122fab104c73c29"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2b65060c84ee4d8dc64fae6d2728b528e9e832e1",
          "url": "https://git.kernel.org/stable/c/2b65060c84ee4d8dc64fae6d2728b528e9e832e1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/466d9da267079a8d3b69fa72dfa3a732e1f6dbb5",
          "url": "https://git.kernel.org/stable/c/466d9da267079a8d3b69fa72dfa3a732e1f6dbb5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8dee308e4c01dea48fc104d37f92d5b58c50b96c",
          "url": "https://git.kernel.org/stable/c/8dee308e4c01dea48fc104d37f92d5b58c50b96c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a65ebfed65fa62797ec1f5f1dcf7adb157a2de1e",
          "url": "https://git.kernel.org/stable/c/a65ebfed65fa62797ec1f5f1dcf7adb157a2de1e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c3f37faa71f5d26dd2144b3f2b14525ec8f5e41f",
          "url": "https://git.kernel.org/stable/c/c3f37faa71f5d26dd2144b3f2b14525ec8f5e41f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c8bdfc0297965bb13fa439d36ca9c4f7c8447f0f",
          "url": "https://git.kernel.org/stable/c/c8bdfc0297965bb13fa439d36ca9c4f7c8447f0f"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        }
      ],
      "release_date": "2025-05-20T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53577",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, cpumap: Make sure kthread is running before map update returns\n\nThe following warning was reported when running stress-mode enabled\nxdp_redirect_cpu with some RT threads:\n\n  ------------[ cut here ]------------\n  WARNING: CPU: 4 PID: 65 at kernel/bpf/cpumap.c:135\n  CPU: 4 PID: 65 Comm: kworker/4:1 Not tainted 6.5.0-rc2+ #1\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)\n  Workqueue: events cpu_map_kthread_stop\n  RIP: 0010:put_cpu_map_entry+0xda/0x220\n  ......\n  Call Trace:\n   <TASK>\n   ? show_regs+0x65/0x70\n   ? __warn+0xa5/0x240\n   ......\n   ? put_cpu_map_entry+0xda/0x220\n   cpu_map_kthread_stop+0x41/0x60\n   process_one_work+0x6b0/0xb80\n   worker_thread+0x96/0x720\n   kthread+0x1a5/0x1f0\n   ret_from_fork+0x3a/0x70\n   ret_from_fork_asm+0x1b/0x30\n   </TASK>\n\nThe root cause is the same as commit 436901649731 (\"bpf: cpumap: Fix memory\nleak in cpu_map_update_elem\"). The kthread is stopped prematurely by\nkthread_stop() in cpu_map_kthread_stop(), and kthread() doesn't call\ncpu_map_kthread_run() at all but XDP program has already queued some\nframes or skbs into ptr_ring. So when __cpu_map_ring_cleanup() checks\nthe ptr_ring, it will find it was not emptied and report a warning.\n\nAn alternative fix is to use __cpu_map_ring_cleanup() to drop these\npending frames or skbs when kthread_stop() returns -EINTR, but it may\nconfuse the user, because these frames or skbs have been handled\ncorrectly by XDP program. So instead of dropping these frames or skbs,\njust make sure the per-cpu kthread is running before\n__cpu_map_entry_alloc() returns.\n\nAfter apply the fix, the error handle for kthread_stop() will be\nunnecessary because it will always return 0, so just remove it.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53577"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/640a604585aa30f93e39b17d4d6ba69fcb1e66c9",
          "url": "https://git.kernel.org/stable/c/640a604585aa30f93e39b17d4d6ba69fcb1e66c9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7a1178a3671b40746830d355836b72e47ceb2490",
          "url": "https://git.kernel.org/stable/c/7a1178a3671b40746830d355836b72e47ceb2490"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b44d28b98f185d2f2348aa3c3636838c316f889e",
          "url": "https://git.kernel.org/stable/c/b44d28b98f185d2f2348aa3c3636838c316f889e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ecb45b852af5e88257020b88bea5ff0798d72aca",
          "url": "https://git.kernel.org/stable/c/ecb45b852af5e88257020b88bea5ff0798d72aca"
        }
      ],
      "release_date": "2025-10-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38069",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: endpoint: pci-epf-test: Fix double free that causes kernel to oops\n\nFix a kernel oops found while testing the stm32_pcie Endpoint driver\nwith handling of PERST# deassertion:\n\nDuring EP initialization, pci_epf_test_alloc_space() allocates all BARs,\nwhich are further freed if epc_set_bar() fails (for instance, due to no\nfree inbound window).\n\nHowever, when pci_epc_set_bar() fails, the error path:\n\n  pci_epc_set_bar() ->\n    pci_epf_free_space()\n\ndoes not clear the previous assignment to epf_test->reg[bar].\n\nThen, if the host reboots, the PERST# deassertion restarts the BAR\nallocation sequence with the same allocation failure (no free inbound\nwindow), creating a double free situation since epf_test->reg[bar] was\ndeallocated and is still non-NULL.\n\nThus, make sure that pci_epf_alloc_space() and pci_epf_free_space()\ninvocations are symmetric, and as such, set epf_test->reg[bar] to NULL\nwhen memory is freed.\n\n[kwilczynski: commit log]",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38069"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8b83893d1f6c6061a7d58169ecdf9d5ee9f306ee",
          "url": "https://git.kernel.org/stable/c/8b83893d1f6c6061a7d58169ecdf9d5ee9f306ee"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/934e9d137d937706004c325fa1474f9e3f1ba10a",
          "url": "https://git.kernel.org/stable/c/934e9d137d937706004c325fa1474f9e3f1ba10a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fe2329eff5bee461ebcafadb6ca1df0cbf5945fd",
          "url": "https://git.kernel.org/stable/c/fe2329eff5bee461ebcafadb6ca1df0cbf5945fd"
        }
      ],
      "release_date": "2025-06-18T10:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38079",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: algif_hash - fix double free in hash_accept\n\nIf accept(2) is called on socket type algif_hash with\nMSG_MORE flag set and crypto_ahash_import fails,\nsk2 is freed. However, it is also freed in af_alg_release,\nleading to slab-use-after-free error.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38079"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0346f4b742345d1c733c977f3a7aef5a6419a967",
          "url": "https://git.kernel.org/stable/c/0346f4b742345d1c733c977f3a7aef5a6419a967"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/134daaba93193df9e988524b5cd2f52d15eb1993",
          "url": "https://git.kernel.org/stable/c/134daaba93193df9e988524b5cd2f52d15eb1993"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2f45a8d64fb4ed4830a4b3273834ecd6ca504896",
          "url": "https://git.kernel.org/stable/c/2f45a8d64fb4ed4830a4b3273834ecd6ca504896"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5bff312b59b3f2a54ff504e4f4e47272b64f3633",
          "url": "https://git.kernel.org/stable/c/5bff312b59b3f2a54ff504e4f4e47272b64f3633"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b2df03ed4052e97126267e8c13ad4204ea6ba9b6",
          "url": "https://git.kernel.org/stable/c/b2df03ed4052e97126267e8c13ad4204ea6ba9b6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bf7bba75b91539e93615f560893a599c1e1c98bf",
          "url": "https://git.kernel.org/stable/c/bf7bba75b91539e93615f560893a599c1e1c98bf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c3059d58f79fdfb2201249c2741514e34562b547",
          "url": "https://git.kernel.org/stable/c/c3059d58f79fdfb2201249c2741514e34562b547"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f0f3d09f53534ea385d55ced408f2b67059b16e4",
          "url": "https://git.kernel.org/stable/c/f0f3d09f53534ea385d55ced408f2b67059b16e4"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-06-18T10:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39743",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: truncate good inode pages when hard link is 0\n\nThe fileset value of the inode copy from the disk by the reproducer is\nAGGR_RESERVED_I. When executing evict, its hard link number is 0, so its\ninode pages are not truncated. This causes the bugon to be triggered when\nexecuting clear_inode() because nrpages is greater than 0.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39743"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1bb5cdc3e39f0c2b311fcb631258b7e60d3fb0d3",
          "url": "https://git.kernel.org/stable/c/1bb5cdc3e39f0c2b311fcb631258b7e60d3fb0d3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2b1d5ca395a5fb170c3f885cd42c16179f7f54ec",
          "url": "https://git.kernel.org/stable/c/2b1d5ca395a5fb170c3f885cd42c16179f7f54ec"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2d91b3765cd05016335cd5df5e5c6a29708ec058",
          "url": "https://git.kernel.org/stable/c/2d91b3765cd05016335cd5df5e5c6a29708ec058"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/34d8e982bac48bdcca7524644a8825a580edce74",
          "url": "https://git.kernel.org/stable/c/34d8e982bac48bdcca7524644a8825a580edce74"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5845b926c561b8333cd65169526eec357d7bb449",
          "url": "https://git.kernel.org/stable/c/5845b926c561b8333cd65169526eec357d7bb449"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/89fff8e3d6710fc32507b8e19eb5afa9fb79b896",
          "url": "https://git.kernel.org/stable/c/89fff8e3d6710fc32507b8e19eb5afa9fb79b896"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8ed7275910fb7177012619864e04d3008763f3ea",
          "url": "https://git.kernel.org/stable/c/8ed7275910fb7177012619864e04d3008763f3ea"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b5b471820c33365a8ccd2d463578bf4e47056c2c",
          "url": "https://git.kernel.org/stable/c/b5b471820c33365a8ccd2d463578bf4e47056c2c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/df3fd8daf278eca365f221749ae5b728e8382a04",
          "url": "https://git.kernel.org/stable/c/df3fd8daf278eca365f221749ae5b728e8382a04"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-11T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53515",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-mmio: don't break lifecycle of vm_dev\n\nvm_dev has a separate lifecycle because it has a 'struct device'\nembedded. Thus, having a release callback for it is correct.\n\nAllocating the vm_dev struct with devres totally breaks this protection,\nthough. Instead of waiting for the vm_dev release callback, the memory\nis freed when the platform_device is removed. Resulting in a\nuse-after-free when finally the callback is to be called.\n\nTo easily see the problem, compile the kernel with\nCONFIG_DEBUG_KOBJECT_RELEASE and unbind with sysfs.\n\nThe fix is easy, don't use devres in this case.\n\nFound during my research about object lifetime problems.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53515"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2dcb368fe5a8eee498ca75c93a18ce2f3b0d6a8e",
          "url": "https://git.kernel.org/stable/c/2dcb368fe5a8eee498ca75c93a18ce2f3b0d6a8e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3ff54d904fafabd0912796785e53cce4e69ca123",
          "url": "https://git.kernel.org/stable/c/3ff54d904fafabd0912796785e53cce4e69ca123"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/55c91fedd03d7b9cf0c5199b2eb12b9b8e95281a",
          "url": "https://git.kernel.org/stable/c/55c91fedd03d7b9cf0c5199b2eb12b9b8e95281a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5b7d5c2dd664eb8b9a06ecbc06e28d39359c422e",
          "url": "https://git.kernel.org/stable/c/5b7d5c2dd664eb8b9a06ecbc06e28d39359c422e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/97a2d55ead76358245b446efd87818e919196d7a",
          "url": "https://git.kernel.org/stable/c/97a2d55ead76358245b446efd87818e919196d7a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/af5818c35173e096085c6ae2e3aac605d3d15e41",
          "url": "https://git.kernel.org/stable/c/af5818c35173e096085c6ae2e3aac605d3d15e41"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b788ad3b2468512339c05f23692e36860264e674",
          "url": "https://git.kernel.org/stable/c/b788ad3b2468512339c05f23692e36860264e674"
        }
      ],
      "release_date": "2025-10-01T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53619",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: conntrack: Avoid nf_ct_helper_hash uses after free\n\nIf nf_conntrack_init_start() fails (for example due to a\nregister_nf_conntrack_bpf() failure), the nf_conntrack_helper_fini()\nclean-up path frees the nf_ct_helper_hash map.\n\nWhen built with NF_CONNTRACK=y, further netfilter modules (e.g:\nnetfilter_conntrack_ftp) can still be loaded and call\nnf_conntrack_helpers_register(), independently of whether nf_conntrack\ninitialized correctly. This accesses the nf_ct_helper_hash dangling\npointer and causes a uaf, possibly leading to random memory corruption.\n\nThis patch guards nf_conntrack_helper_register() from accessing a freed\nor uninitialized nf_ct_helper_hash pointer and fixes possible\nuses-after-free when loading a conntrack module.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53619"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/00716f25f9697d02a0d9bd622575c7c7321ba3d0",
          "url": "https://git.kernel.org/stable/c/00716f25f9697d02a0d9bd622575c7c7321ba3d0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/05561f822f27b9fa88fa5504ddec34bf38833034",
          "url": "https://git.kernel.org/stable/c/05561f822f27b9fa88fa5504ddec34bf38833034"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4ee69c91cb8f9ca144bc0861969e5a1a3c6152a7",
          "url": "https://git.kernel.org/stable/c/4ee69c91cb8f9ca144bc0861969e5a1a3c6152a7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/61c7a5256543ae7d24cd9d21853d514c8632e1e9",
          "url": "https://git.kernel.org/stable/c/61c7a5256543ae7d24cd9d21853d514c8632e1e9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6eef7a2b933885a17679eb8ed0796ddf0ee5309b",
          "url": "https://git.kernel.org/stable/c/6eef7a2b933885a17679eb8ed0796ddf0ee5309b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6f03ce2f1abcb9f9d0511e3659ca6eb60e39f566",
          "url": "https://git.kernel.org/stable/c/6f03ce2f1abcb9f9d0511e3659ca6eb60e39f566"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8289d422f5e484efe4a565fe18e862ecd621c175",
          "url": "https://git.kernel.org/stable/c/8289d422f5e484efe4a565fe18e862ecd621c175"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fce5cc7cbd4b92f979bf02c9ec5fb69aaeba92d7",
          "url": "https://git.kernel.org/stable/c/fce5cc7cbd4b92f979bf02c9ec5fb69aaeba92d7"
        }
      ],
      "release_date": "2025-10-07T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39702",
      "cwe": {
        "id": "CWE-203",
        "name": "Observable Discrepancy"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: sr: Fix MAC comparison to be constant-time\n\nTo prevent timing attacks, MACs need to be compared in constant time.\nUse the appropriate helper function for this.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39702"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3b348c9c8d2ca2c67559ffd0e258ae7e1107d4f0",
          "url": "https://git.kernel.org/stable/c/3b348c9c8d2ca2c67559ffd0e258ae7e1107d4f0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3ddd55cf19ed6cc62def5e3af10c2a9df1b861c3",
          "url": "https://git.kernel.org/stable/c/3ddd55cf19ed6cc62def5e3af10c2a9df1b861c3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/86b6d34717fe0570afce07ee79b8eeb40341f831",
          "url": "https://git.kernel.org/stable/c/86b6d34717fe0570afce07ee79b8eeb40341f831"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a458b2902115b26a25d67393b12ddd57d1216aaa",
          "url": "https://git.kernel.org/stable/c/a458b2902115b26a25d67393b12ddd57d1216aaa"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b3967c493799e63f648e9c7b6cb063aa2aed04e7",
          "url": "https://git.kernel.org/stable/c/b3967c493799e63f648e9c7b6cb063aa2aed04e7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f7878d47560d61e3f370aca3cebb8f42a55b990a",
          "url": "https://git.kernel.org/stable/c/f7878d47560d61e3f370aca3cebb8f42a55b990a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ff55a452d56490047f5233cc48c5d933f8586884",
          "url": "https://git.kernel.org/stable/c/ff55a452d56490047f5233cc48c5d933f8586884"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-05T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38527",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix use-after-free in cifs_oplock_break\n\nA race condition can occur in cifs_oplock_break() leading to a\nuse-after-free of the cinode structure when unmounting:\n\n  cifs_oplock_break()\n    _cifsFileInfo_put(cfile)\n      cifsFileInfo_put_final()\n        cifs_sb_deactive()\n          [last ref, start releasing sb]\n            kill_sb()\n              kill_anon_super()\n                generic_shutdown_super()\n                  evict_inodes()\n                    dispose_list()\n                      evict()\n                        destroy_inode()\n                          call_rcu(&inode->i_rcu, i_callback)\n    spin_lock(&cinode->open_file_lock)  <- OK\n                            [later] i_callback()\n                              cifs_free_inode()\n                                kmem_cache_free(cinode)\n    spin_unlock(&cinode->open_file_lock)  <- UAF\n    cifs_done_oplock_break(cinode)       <- UAF\n\nThe issue occurs when umount has already released its reference to the\nsuperblock. When _cifsFileInfo_put() calls cifs_sb_deactive(), this\nreleases the last reference, triggering the immediate cleanup of all\ninodes under RCU. However, cifs_oplock_break() continues to access the\ncinode after this point, resulting in use-after-free.\n\nFix this by holding an extra reference to the superblock during the\nentire oplock break operation. This ensures that the superblock and\nits inodes remain valid until the oplock break completes.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38527"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/09bce2138a30ef10d8821c8c3f73a4ab7a5726bc",
          "url": "https://git.kernel.org/stable/c/09bce2138a30ef10d8821c8c3f73a4ab7a5726bc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0a4eec84d4d2c4085d4ed8630fd74e4b39033c1b",
          "url": "https://git.kernel.org/stable/c/0a4eec84d4d2c4085d4ed8630fd74e4b39033c1b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2baaf5bbab2ac474c4f92c10fcb3310f824db995",
          "url": "https://git.kernel.org/stable/c/2baaf5bbab2ac474c4f92c10fcb3310f824db995"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4256a483fe58af66a46cbf3dc48ff26e580d3308",
          "url": "https://git.kernel.org/stable/c/4256a483fe58af66a46cbf3dc48ff26e580d3308"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/705c79101ccf9edea5a00d761491a03ced314210",
          "url": "https://git.kernel.org/stable/c/705c79101ccf9edea5a00d761491a03ced314210"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/da11bd4b697b393a207f19a2ed7d382a811a3ddc",
          "url": "https://git.kernel.org/stable/c/da11bd4b697b393a207f19a2ed7d382a811a3ddc"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-08-16T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38713",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()\n\nThe hfsplus_readdir() method is capable to crash by calling\nhfsplus_uni2asc():\n\n[  667.121659][ T9805] ==================================================================\n[  667.122651][ T9805] BUG: KASAN: slab-out-of-bounds in hfsplus_uni2asc+0x902/0xa10\n[  667.123627][ T9805] Read of size 2 at addr ffff88802592f40c by task repro/9805\n[  667.124578][ T9805]\n[  667.124876][ T9805] CPU: 3 UID: 0 PID: 9805 Comm: repro Not tainted 6.16.0-rc3 #1 PREEMPT(full)\n[  667.124886][ T9805] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n[  667.124890][ T9805] Call Trace:\n[  667.124893][ T9805]  <TASK>\n[  667.124896][ T9805]  dump_stack_lvl+0x10e/0x1f0\n[  667.124911][ T9805]  print_report+0xd0/0x660\n[  667.124920][ T9805]  ? __virt_addr_valid+0x81/0x610\n[  667.124928][ T9805]  ? __phys_addr+0xe8/0x180\n[  667.124934][ T9805]  ? hfsplus_uni2asc+0x902/0xa10\n[  667.124942][ T9805]  kasan_report+0xc6/0x100\n[  667.124950][ T9805]  ? hfsplus_uni2asc+0x902/0xa10\n[  667.124959][ T9805]  hfsplus_uni2asc+0x902/0xa10\n[  667.124966][ T9805]  ? hfsplus_bnode_read+0x14b/0x360\n[  667.124974][ T9805]  hfsplus_readdir+0x845/0xfc0\n[  667.124984][ T9805]  ? __pfx_hfsplus_readdir+0x10/0x10\n[  667.124994][ T9805]  ? stack_trace_save+0x8e/0xc0\n[  667.125008][ T9805]  ? iterate_dir+0x18b/0xb20\n[  667.125015][ T9805]  ? trace_lock_acquire+0x85/0xd0\n[  667.125022][ T9805]  ? lock_acquire+0x30/0x80\n[  667.125029][ T9805]  ? iterate_dir+0x18b/0xb20\n[  667.125037][ T9805]  ? down_read_killable+0x1ed/0x4c0\n[  667.125044][ T9805]  ? putname+0x154/0x1a0\n[  667.125051][ T9805]  ? __pfx_down_read_killable+0x10/0x10\n[  667.125058][ T9805]  ? apparmor_file_permission+0x239/0x3e0\n[  667.125069][ T9805]  iterate_dir+0x296/0xb20\n[  667.125076][ T9805]  __x64_sys_getdents64+0x13c/0x2c0\n[  667.125084][ T9805]  ? __pfx___x64_sys_getdents64+0x10/0x10\n[  667.125091][ T9805]  ? __x64_sys_openat+0x141/0x200\n[  667.125126][ T9805]  ? __pfx_filldir64+0x10/0x10\n[  667.125134][ T9805]  ? do_user_addr_fault+0x7fe/0x12f0\n[  667.125143][ T9805]  do_syscall_64+0xc9/0x480\n[  667.125151][ T9805]  entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[  667.125158][ T9805] RIP: 0033:0x7fa8753b2fc9\n[  667.125164][ T9805] Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 48\n[  667.125172][ T9805] RSP: 002b:00007ffe96f8e0f8 EFLAGS: 00000217 ORIG_RAX: 00000000000000d9\n[  667.125181][ T9805] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa8753b2fc9\n[  667.125185][ T9805] RDX: 0000000000000400 RSI: 00002000000063c0 RDI: 0000000000000004\n[  667.125190][ T9805] RBP: 00007ffe96f8e110 R08: 00007ffe96f8e110 R09: 00007ffe96f8e110\n[  667.125195][ T9805] R10: 0000000000000000 R11: 0000000000000217 R12: 0000556b1e3b4260\n[  667.125199][ T9805] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[  667.125207][ T9805]  </TASK>\n[  667.125210][ T9805]\n[  667.145632][ T9805] Allocated by task 9805:\n[  667.145991][ T9805]  kasan_save_stack+0x20/0x40\n[  667.146352][ T9805]  kasan_save_track+0x14/0x30\n[  667.146717][ T9805]  __kasan_kmalloc+0xaa/0xb0\n[  667.147065][ T9805]  __kmalloc_noprof+0x205/0x550\n[  667.147448][ T9805]  hfsplus_find_init+0x95/0x1f0\n[  667.147813][ T9805]  hfsplus_readdir+0x220/0xfc0\n[  667.148174][ T9805]  iterate_dir+0x296/0xb20\n[  667.148549][ T9805]  __x64_sys_getdents64+0x13c/0x2c0\n[  667.148937][ T9805]  do_syscall_64+0xc9/0x480\n[  667.149291][ T9805]  entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[  667.149809][ T9805]\n[  667.150030][ T9805] The buggy address belongs to the object at ffff88802592f000\n[  667.150030][ T9805]  which belongs to the cache kmalloc-2k of size 2048\n[  667.151282][ T9805] The buggy address is located 0 bytes to the right of\n[  667.151282][ T9805]  allocated 1036-byte region [ffff88802592f000, ffff88802592f40c)\n[  667.1\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38713"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/13604b1d7e7b125fb428cddbec6b8d92baad25d5",
          "url": "https://git.kernel.org/stable/c/13604b1d7e7b125fb428cddbec6b8d92baad25d5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1ca69007e52a73bd8b84b988b61b319816ca8b01",
          "url": "https://git.kernel.org/stable/c/1ca69007e52a73bd8b84b988b61b319816ca8b01"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/291bb5d931c6f3cd7227b913302a17be21cf53b0",
          "url": "https://git.kernel.org/stable/c/291bb5d931c6f3cd7227b913302a17be21cf53b0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6f93694bcbc2c2ab3e01cd8fba2f296faf34e6b9",
          "url": "https://git.kernel.org/stable/c/6f93694bcbc2c2ab3e01cd8fba2f296faf34e6b9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/73f7da507d787b489761a0fa280716f84fa32b2f",
          "url": "https://git.kernel.org/stable/c/73f7da507d787b489761a0fa280716f84fa32b2f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/76a4c6636a69d69409aa253b049b1be717a539c5",
          "url": "https://git.kernel.org/stable/c/76a4c6636a69d69409aa253b049b1be717a539c5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/94458781aee6045bd3d0ad4b80b02886b9e2219b",
          "url": "https://git.kernel.org/stable/c/94458781aee6045bd3d0ad4b80b02886b9e2219b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ccf0ad56a779e6704c0b27f555dec847f50c7557",
          "url": "https://git.kernel.org/stable/c/ccf0ad56a779e6704c0b27f555dec847f50c7557"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f7534cbfac0a9ffa4fa17cacc6e8b6446dae24ee",
          "url": "https://git.kernel.org/stable/c/f7534cbfac0a9ffa4fa17cacc6e8b6446dae24ee"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37839",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\njbd2: remove wrong sb->s_sequence check\n\nJournal emptiness is not determined by sb->s_sequence == 0 but rather by\nsb->s_start == 0 (which is set a few lines above). Furthermore 0 is a\nvalid transaction ID so the check can spuriously trigger. Remove the\ninvalid WARN_ON.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37839"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3b4643ffaf72d7a5a357e9bf68b1775f8cfe7e77",
          "url": "https://git.kernel.org/stable/c/3b4643ffaf72d7a5a357e9bf68b1775f8cfe7e77"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9eaec071f111cd2124ce9a5b93536d3f6837d457",
          "url": "https://git.kernel.org/stable/c/9eaec071f111cd2124ce9a5b93536d3f6837d457"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ad926f735b4d4f10768fec7d080cadeb6d075cac",
          "url": "https://git.kernel.org/stable/c/ad926f735b4d4f10768fec7d080cadeb6d075cac"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b0cca357f85beb6144ab60c62dcc98508cc044bf",
          "url": "https://git.kernel.org/stable/c/b0cca357f85beb6144ab60c62dcc98508cc044bf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b479839525fe7906966cdc4b5b2afbca048558a1",
          "url": "https://git.kernel.org/stable/c/b479839525fe7906966cdc4b5b2afbca048558a1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c88f7328bb0fff66520fc9164f02b1d06e083c1b",
          "url": "https://git.kernel.org/stable/c/c88f7328bb0fff66520fc9164f02b1d06e083c1b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c98eb9ffb1d9c98237b5e1668eee17654e129fb0",
          "url": "https://git.kernel.org/stable/c/c98eb9ffb1d9c98237b5e1668eee17654e129fb0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cf30432f5b3064ff85d85639c2f0106f89c566f6",
          "url": "https://git.kernel.org/stable/c/cf30432f5b3064ff85d85639c2f0106f89c566f6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e6eff39dd0fe4190c6146069cc16d160e71d1148",
          "url": "https://git.kernel.org/stable/c/e6eff39dd0fe4190c6146069cc16d160e71d1148"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-09T07:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39967",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbcon: fix integer overflow in fbcon_do_set_font\n\nFix integer overflow vulnerabilities in fbcon_do_set_font() where font\nsize calculations could overflow when handling user-controlled font\nparameters.\n\nThe vulnerabilities occur when:\n1. CALC_FONTSZ(h, pitch, charcount) performs h * pith * charcount\n   multiplication with user-controlled values that can overflow.\n2. FONT_EXTRA_WORDS * sizeof(int) + size addition can also overflow\n3. This results in smaller allocations than expected, leading to buffer\n   overflows during font data copying.\n\nAdd explicit overflow checking using check_mul_overflow() and\ncheck_add_overflow() kernel helpers to safety validate all size\ncalculations before allocation.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39967"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1a194e6c8e1ee745e914b0b7f50fa86c89ed13fe",
          "url": "https://git.kernel.org/stable/c/1a194e6c8e1ee745e914b0b7f50fa86c89ed13fe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4a4bac869560f943edbe3c2b032062f6673b13d3",
          "url": "https://git.kernel.org/stable/c/4a4bac869560f943edbe3c2b032062f6673b13d3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/994bdc2d23c79087fbf7dcd9544454e8ebcef877",
          "url": "https://git.kernel.org/stable/c/994bdc2d23c79087fbf7dcd9544454e8ebcef877"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9c8ec14075c5317edd6b242f1be8167aa1e4e333",
          "url": "https://git.kernel.org/stable/c/9c8ec14075c5317edd6b242f1be8167aa1e4e333"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a6eb9f423b3db000aaedf83367b8539f6b72dcfc",
          "url": "https://git.kernel.org/stable/c/a6eb9f423b3db000aaedf83367b8539f6b72dcfc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/adac90bb1aaf45ca66f9db8ac100be16750ace78",
          "url": "https://git.kernel.org/stable/c/adac90bb1aaf45ca66f9db8ac100be16750ace78"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b8a6e85328aeb9881531dbe89bcd2637a06c3c95",
          "url": "https://git.kernel.org/stable/c/b8a6e85328aeb9881531dbe89bcd2637a06c3c95"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c0c01f9aa08c8e10e10e8c9ebb5be01a4eff6eb7",
          "url": "https://git.kernel.org/stable/c/c0c01f9aa08c8e10e10e8c9ebb5be01a4eff6eb7"
        }
      ],
      "release_date": "2025-10-15T08:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38051",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: Fix use-after-free in cifs_fill_dirent\n\nThere is a race condition in the readdir concurrency process, which may\naccess the rsp buffer after it has been released, triggering the\nfollowing KASAN warning.\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in cifs_fill_dirent+0xb03/0xb60 [cifs]\n Read of size 4 at addr ffff8880099b819c by task a.out/342975\n\n CPU: 2 UID: 0 PID: 342975 Comm: a.out Not tainted 6.15.0-rc6+ #240 PREEMPT(full)\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014\n Call Trace:\n  <TASK>\n  dump_stack_lvl+0x53/0x70\n  print_report+0xce/0x640\n  kasan_report+0xb8/0xf0\n  cifs_fill_dirent+0xb03/0xb60 [cifs]\n  cifs_readdir+0x12cb/0x3190 [cifs]\n  iterate_dir+0x1a1/0x520\n  __x64_sys_getdents+0x134/0x220\n  do_syscall_64+0x4b/0x110\n  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n RIP: 0033:0x7f996f64b9f9\n Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89\n f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01\n f0 ff ff  0d f7 c3 0c 00 f7 d8 64 89 8\n RSP: 002b:00007f996f53de78 EFLAGS: 00000207 ORIG_RAX: 000000000000004e\n RAX: ffffffffffffffda RBX: 00007f996f53ecdc RCX: 00007f996f64b9f9\n RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003\n RBP: 00007f996f53dea0 R08: 0000000000000000 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000207 R12: ffffffffffffff88\n R13: 0000000000000000 R14: 00007ffc8cd9a500 R15: 00007f996f51e000\n  </TASK>\n\n Allocated by task 408:\n  kasan_save_stack+0x20/0x40\n  kasan_save_track+0x14/0x30\n  __kasan_slab_alloc+0x6e/0x70\n  kmem_cache_alloc_noprof+0x117/0x3d0\n  mempool_alloc_noprof+0xf2/0x2c0\n  cifs_buf_get+0x36/0x80 [cifs]\n  allocate_buffers+0x1d2/0x330 [cifs]\n  cifs_demultiplex_thread+0x22b/0x2690 [cifs]\n  kthread+0x394/0x720\n  ret_from_fork+0x34/0x70\n  ret_from_fork_asm+0x1a/0x30\n\n Freed by task 342979:\n  kasan_save_stack+0x20/0x40\n  kasan_save_track+0x14/0x30\n  kasan_save_free_info+0x3b/0x60\n  __kasan_slab_free+0x37/0x50\n  kmem_cache_free+0x2b8/0x500\n  cifs_buf_release+0x3c/0x70 [cifs]\n  cifs_readdir+0x1c97/0x3190 [cifs]\n  iterate_dir+0x1a1/0x520\n  __x64_sys_getdents64+0x134/0x220\n  do_syscall_64+0x4b/0x110\n  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n The buggy address belongs to the object at ffff8880099b8000\n  which belongs to the cache cifs_request of size 16588\n The buggy address is located 412 bytes inside of\n  freed 16588-byte region [ffff8880099b8000, ffff8880099bc0cc)\n\n The buggy address belongs to the physical page:\n page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x99b8\n head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n anon flags: 0x80000000000040(head|node=0|zone=1)\n page_type: f5(slab)\n raw: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001\n raw: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000\n head: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001\n head: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000\n head: 0080000000000003 ffffea0000266e01 00000000ffffffff 00000000ffffffff\n head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008\n page dumped because: kasan: bad access detected\n\n Memory state around the buggy address:\n  ffff8880099b8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n  ffff8880099b8100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n >ffff8880099b8180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n                             ^\n  ffff8880099b8200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n  ffff8880099b8280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n ==================================================================\n\nPOC is available in the link [1].\n\nThe problem triggering process is as follows:\n\nProcess 1                       Process 2\n-----------------------------------\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38051"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1b197931fbc821bc7e9e91bf619400db563e3338",
          "url": "https://git.kernel.org/stable/c/1b197931fbc821bc7e9e91bf619400db563e3338"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/73cadde98f67f76c5eba00ac0b72c453383cec8b",
          "url": "https://git.kernel.org/stable/c/73cadde98f67f76c5eba00ac0b72c453383cec8b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9bea368648ac46f8593a780760362e40291d22a9",
          "url": "https://git.kernel.org/stable/c/9bea368648ac46f8593a780760362e40291d22a9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9c9aafbacc183598f064902365e107b5e856531f",
          "url": "https://git.kernel.org/stable/c/9c9aafbacc183598f064902365e107b5e856531f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a24c2f05ac3c5b0aaa539d9d913826d2643dfd0e",
          "url": "https://git.kernel.org/stable/c/a24c2f05ac3c5b0aaa539d9d913826d2643dfd0e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a7a8fe56e932a36f43e031b398aef92341bf5ea0",
          "url": "https://git.kernel.org/stable/c/a7a8fe56e932a36f43e031b398aef92341bf5ea0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/aee067e88d61eb72e966f094e4749c6b14e7008f",
          "url": "https://git.kernel.org/stable/c/aee067e88d61eb72e966f094e4749c6b14e7008f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c8623231e0edfcccb7cc6add0288fa0f0594282f",
          "url": "https://git.kernel.org/stable/c/c8623231e0edfcccb7cc6add0288fa0f0594282f"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-06-18T10:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37823",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too\n\nSimilarly to the previous patch, we need to safe guard hfsc_dequeue()\ntoo. But for this one, we don't have a reliable reproducer.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37823"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/11bccb054c1462fb069219f8e98e97a5a730758e",
          "url": "https://git.kernel.org/stable/c/11bccb054c1462fb069219f8e98e97a5a730758e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2f46d14919c39528c6e540ebc43f90055993eedc",
          "url": "https://git.kernel.org/stable/c/2f46d14919c39528c6e540ebc43f90055993eedc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/68f256305ceb426d545a0dc31f83c2ab1d211a1e",
          "url": "https://git.kernel.org/stable/c/68f256305ceb426d545a0dc31f83c2ab1d211a1e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6ccbda44e2cc3d26fd22af54c650d6d5d801addf",
          "url": "https://git.kernel.org/stable/c/6ccbda44e2cc3d26fd22af54c650d6d5d801addf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/76c4c22c2437d3d3880efc0f62eca06ef078d290",
          "url": "https://git.kernel.org/stable/c/76c4c22c2437d3d3880efc0f62eca06ef078d290"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c6936266f8bf98a53f28ef9a820e6a501e946d09",
          "url": "https://git.kernel.org/stable/c/c6936266f8bf98a53f28ef9a820e6a501e946d09"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c6f035044104c6ff656f4565cd22938dc892528c",
          "url": "https://git.kernel.org/stable/c/c6f035044104c6ff656f4565cd22938dc892528c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/da7936518996d290e2fcfcaf6cd7e15bfd87804a",
          "url": "https://git.kernel.org/stable/c/da7936518996d290e2fcfcaf6cd7e15bfd87804a"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-08T07:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38346",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nftrace: Fix UAF when lookup kallsym after ftrace disabled\n\nThe following issue happens with a buggy module:\n\nBUG: unable to handle page fault for address: ffffffffc05d0218\nPGD 1bd66f067 P4D 1bd66f067 PUD 1bd671067 PMD 101808067 PTE 0\nOops: Oops: 0000 [#1] SMP KASAN PTI\nTainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\nRIP: 0010:sized_strscpy+0x81/0x2f0\nRSP: 0018:ffff88812d76fa08 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: ffffffffc0601010 RCX: dffffc0000000000\nRDX: 0000000000000038 RSI: dffffc0000000000 RDI: ffff88812608da2d\nRBP: 8080808080808080 R08: ffff88812608da2d R09: ffff88812608da68\nR10: ffff88812608d82d R11: ffff88812608d810 R12: 0000000000000038\nR13: ffff88812608da2d R14: ffffffffc05d0218 R15: fefefefefefefeff\nFS:  00007fef552de740(0000) GS:ffff8884251c7000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffffffc05d0218 CR3: 00000001146f0000 CR4: 00000000000006f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n ftrace_mod_get_kallsym+0x1ac/0x590\n update_iter_mod+0x239/0x5b0\n s_next+0x5b/0xa0\n seq_read_iter+0x8c9/0x1070\n seq_read+0x249/0x3b0\n proc_reg_read+0x1b0/0x280\n vfs_read+0x17f/0x920\n ksys_read+0xf3/0x1c0\n do_syscall_64+0x5f/0x2e0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nThe above issue may happen as follows:\n(1) Add kprobe tracepoint;\n(2) insmod test.ko;\n(3)  Module triggers ftrace disabled;\n(4) rmmod test.ko;\n(5) cat /proc/kallsyms; --> Will trigger UAF as test.ko already removed;\nftrace_mod_get_kallsym()\n...\nstrscpy(module_name, mod_map->mod->name, MODULE_NAME_LEN);\n...\n\nThe problem is when a module triggers an issue with ftrace and\nsets ftrace_disable. The ftrace_disable is set when an anomaly is\ndiscovered and to prevent any more damage, ftrace stops all text\nmodification. The issue that happened was that the ftrace_disable stops\nmore than just the text modification.\n\nWhen a module is loaded, its init functions can also be traced. Because\nkallsyms deletes the init functions after a module has loaded, ftrace\nsaves them when the module is loaded and function tracing is enabled. This\nallows the output of the function trace to show the init function names\ninstead of just their raw memory addresses.\n\nWhen a module is removed, ftrace_release_mod() is called, and if\nftrace_disable is set, it just returns without doing anything more. The\nproblem here is that it leaves the mod_list still around and if kallsyms\nis called, it will call into this code and access the module memory that\nhas already been freed as it will return:\n\n  strscpy(module_name, mod_map->mod->name, MODULE_NAME_LEN);\n\nWhere the \"mod\" no longer exists and triggers a UAF bug.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38346"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/03a162933c4a03b9f1a84f7d8482903c7e1e11bb",
          "url": "https://git.kernel.org/stable/c/03a162933c4a03b9f1a84f7d8482903c7e1e11bb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6805582abb720681dd1c87ff677f155dcf4e86c9",
          "url": "https://git.kernel.org/stable/c/6805582abb720681dd1c87ff677f155dcf4e86c9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/83a692a9792aa86249d68a8ac0b9d55ecdd255fa",
          "url": "https://git.kernel.org/stable/c/83a692a9792aa86249d68a8ac0b9d55ecdd255fa"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8690cd3258455bbae64f809e1d3ee0f043661c71",
          "url": "https://git.kernel.org/stable/c/8690cd3258455bbae64f809e1d3ee0f043661c71"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8e89c17dc8970c5f71a3a991f5724d4c8de42d8c",
          "url": "https://git.kernel.org/stable/c/8e89c17dc8970c5f71a3a991f5724d4c8de42d8c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d064c68781c19f378af1ae741d9132d35d24b2bb",
          "url": "https://git.kernel.org/stable/c/d064c68781c19f378af1ae741d9132d35d24b2bb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f78a786ad9a5443a29eef4dae60cde85b7375129",
          "url": "https://git.kernel.org/stable/c/f78a786ad9a5443a29eef4dae60cde85b7375129"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f914b52c379c12288b7623bb814d0508dbe7481d",
          "url": "https://git.kernel.org/stable/c/f914b52c379c12288b7623bb814d0508dbe7481d"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-10T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39683",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Limit access to parser->buffer when trace_get_user failed\n\nWhen the length of the string written to set_ftrace_filter exceeds\nFTRACE_BUFF_MAX, the following KASAN alarm will be triggered:\n\nBUG: KASAN: slab-out-of-bounds in strsep+0x18c/0x1b0\nRead of size 1 at addr ffff0000d00bd5ba by task ash/165\n\nCPU: 1 UID: 0 PID: 165 Comm: ash Not tainted 6.16.0-g6bcdbd62bd56-dirty\nHardware name: linux,dummy-virt (DT)\nCall trace:\n show_stack+0x34/0x50 (C)\n dump_stack_lvl+0xa0/0x158\n print_address_description.constprop.0+0x88/0x398\n print_report+0xb0/0x280\n kasan_report+0xa4/0xf0\n __asan_report_load1_noabort+0x20/0x30\n strsep+0x18c/0x1b0\n ftrace_process_regex.isra.0+0x100/0x2d8\n ftrace_regex_release+0x484/0x618\n __fput+0x364/0xa58\n ____fput+0x28/0x40\n task_work_run+0x154/0x278\n do_notify_resume+0x1f0/0x220\n el0_svc+0xec/0xf0\n el0t_64_sync_handler+0xa0/0xe8\n el0t_64_sync+0x1ac/0x1b0\n\nThe reason is that trace_get_user will fail when processing a string\nlonger than FTRACE_BUFF_MAX, but not set the end of parser->buffer to 0.\nThen an OOB access will be triggered in ftrace_regex_release->\nftrace_process_regex->strsep->strpbrk. We can solve this problem by\nlimiting access to parser->buffer when trace_get_user failed.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39683"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3079517a5ba80901fe828a06998da64b9b8749be",
          "url": "https://git.kernel.org/stable/c/3079517a5ba80901fe828a06998da64b9b8749be"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/418b448e1d7470da9d4d4797f71782595ee69c49",
          "url": "https://git.kernel.org/stable/c/418b448e1d7470da9d4d4797f71782595ee69c49"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/41b838420457802f21918df66764b6fbf829d330",
          "url": "https://git.kernel.org/stable/c/41b838420457802f21918df66764b6fbf829d330"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/58ff8064cb4c7eddac4da1a59da039ead586950a",
          "url": "https://git.kernel.org/stable/c/58ff8064cb4c7eddac4da1a59da039ead586950a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6a909ea83f226803ea0e718f6e88613df9234d58",
          "url": "https://git.kernel.org/stable/c/6a909ea83f226803ea0e718f6e88613df9234d58"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b842ef39c2ad6156c13afdec25ecc6792a9b67b9",
          "url": "https://git.kernel.org/stable/c/b842ef39c2ad6156c13afdec25ecc6792a9b67b9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d0c68045b8b0f3737ed7bd6b8c83b7887014adee",
          "url": "https://git.kernel.org/stable/c/d0c68045b8b0f3737ed7bd6b8c83b7887014adee"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-05T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38323",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: atm: add lec_mutex\n\nsyzbot found its way in net/atm/lec.c, and found an error path\nin lecd_attach() could leave a dangling pointer in dev_lec[].\n\nAdd a mutex to protect dev_lecp[] uses from lecd_attach(),\nlec_vcc_attach() and lec_mcast_attach().\n\nFollowing patch will use this mutex for /proc/net/atm/lec.\n\nBUG: KASAN: slab-use-after-free in lecd_attach net/atm/lec.c:751 [inline]\nBUG: KASAN: slab-use-after-free in lane_ioctl+0x2224/0x23e0 net/atm/lec.c:1008\nRead of size 8 at addr ffff88807c7b8e68 by task syz.1.17/6142\n\nCPU: 1 UID: 0 PID: 6142 Comm: syz.1.17 Not tainted 6.16.0-rc1-syzkaller-00239-g08215f5486ec #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025\nCall Trace:\n <TASK>\n  __dump_stack lib/dump_stack.c:94 [inline]\n  dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120\n  print_address_description mm/kasan/report.c:408 [inline]\n  print_report+0xcd/0x680 mm/kasan/report.c:521\n  kasan_report+0xe0/0x110 mm/kasan/report.c:634\n  lecd_attach net/atm/lec.c:751 [inline]\n  lane_ioctl+0x2224/0x23e0 net/atm/lec.c:1008\n  do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159\n  sock_do_ioctl+0x118/0x280 net/socket.c:1190\n  sock_ioctl+0x227/0x6b0 net/socket.c:1311\n  vfs_ioctl fs/ioctl.c:51 [inline]\n  __do_sys_ioctl fs/ioctl.c:907 [inline]\n  __se_sys_ioctl fs/ioctl.c:893 [inline]\n  __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893\n  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n  do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n </TASK>\n\nAllocated by task 6132:\n  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47\n  kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n  __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394\n  kasan_kmalloc include/linux/kasan.h:260 [inline]\n  __do_kmalloc_node mm/slub.c:4328 [inline]\n  __kvmalloc_node_noprof+0x27b/0x620 mm/slub.c:5015\n  alloc_netdev_mqs+0xd2/0x1570 net/core/dev.c:11711\n  lecd_attach net/atm/lec.c:737 [inline]\n  lane_ioctl+0x17db/0x23e0 net/atm/lec.c:1008\n  do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159\n  sock_do_ioctl+0x118/0x280 net/socket.c:1190\n  sock_ioctl+0x227/0x6b0 net/socket.c:1311\n  vfs_ioctl fs/ioctl.c:51 [inline]\n  __do_sys_ioctl fs/ioctl.c:907 [inline]\n  __se_sys_ioctl fs/ioctl.c:893 [inline]\n  __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893\n  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n  do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nFreed by task 6132:\n  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47\n  kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n  kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:576\n  poison_slab_object mm/kasan/common.c:247 [inline]\n  __kasan_slab_free+0x51/0x70 mm/kasan/common.c:264\n  kasan_slab_free include/linux/kasan.h:233 [inline]\n  slab_free_hook mm/slub.c:2381 [inline]\n  slab_free mm/slub.c:4643 [inline]\n  kfree+0x2b4/0x4d0 mm/slub.c:4842\n  free_netdev+0x6c5/0x910 net/core/dev.c:11892\n  lecd_attach net/atm/lec.c:744 [inline]\n  lane_ioctl+0x1ce8/0x23e0 net/atm/lec.c:1008\n  do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159\n  sock_do_ioctl+0x118/0x280 net/socket.c:1190\n  sock_ioctl+0x227/0x6b0 net/socket.c:1311\n  vfs_ioctl fs/ioctl.c:51 [inline]\n  __do_sys_ioctl fs/ioctl.c:907 [inline]\n  __se_sys_ioctl fs/ioctl.c:893 [inline]\n  __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38323"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/17e156a94e94a906a570dbf9b48877956c60bef8",
          "url": "https://git.kernel.org/stable/c/17e156a94e94a906a570dbf9b48877956c60bef8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/18e8f0c4f826fb08c2d3825cdd6c57e24b207e0a",
          "url": "https://git.kernel.org/stable/c/18e8f0c4f826fb08c2d3825cdd6c57e24b207e0a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/64b378db28a967f7b271b055380c2360279aa424",
          "url": "https://git.kernel.org/stable/c/64b378db28a967f7b271b055380c2360279aa424"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a7a713dfb5f9477345450f27c7c0741864511192",
          "url": "https://git.kernel.org/stable/c/a7a713dfb5f9477345450f27c7c0741864511192"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d13a3824bfd2b4774b671a75cf766a16637a0e67",
          "url": "https://git.kernel.org/stable/c/d13a3824bfd2b4774b671a75cf766a16637a0e67"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dffd03422ae6a459039c8602f410e6c0f4cbc6c8",
          "url": "https://git.kernel.org/stable/c/dffd03422ae6a459039c8602f410e6c0f4cbc6c8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e91274cc7ed88ab5bdc62d426067c82b0b118a0b",
          "url": "https://git.kernel.org/stable/c/e91274cc7ed88ab5bdc62d426067c82b0b118a0b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f4d80b16ecc4229f7e6345158ef34c36be323f0e",
          "url": "https://git.kernel.org/stable/c/f4d80b16ecc4229f7e6345158ef34c36be323f0e"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-10T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39685",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: pcl726: Prevent invalid irq number\n\nThe reproducer passed in an irq number(0x80008000) that was too large,\nwhich triggered the oob.\n\nAdded an interrupt number check to prevent users from passing in an irq\nnumber that was too large.\n\nIf `it->options[1]` is 31, then `1 << it->options[1]` is still invalid\nbecause it shifts a 1-bit into the sign bit (which is UB in C).\nPossible solutions include reducing the upper bound on the\n`it->options[1]` value to 30 or lower, or using `1U << it->options[1]`.\n\nThe old code would just not attempt to request the IRQ if the\n`options[1]` value were invalid.  And it would still configure the\ndevice without interrupts even if the call to `request_irq` returned an\nerror.  So it would be better to combine this test with the test below.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39685"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0eb4ed2aa261dee228f1668dbfa6d87353e8162d",
          "url": "https://git.kernel.org/stable/c/0eb4ed2aa261dee228f1668dbfa6d87353e8162d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5a33d07c94ba91306093e823112a7aa9727549f6",
          "url": "https://git.kernel.org/stable/c/5a33d07c94ba91306093e823112a7aa9727549f6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/96cb948408b3adb69df7e451ba7da9d21f814d00",
          "url": "https://git.kernel.org/stable/c/96cb948408b3adb69df7e451ba7da9d21f814d00"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a3cfcd0c78c80ca7cd80372dc28f77d01be57bf6",
          "url": "https://git.kernel.org/stable/c/a3cfcd0c78c80ca7cd80372dc28f77d01be57bf6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bab220b0bb5af652007e278e8e8357f952b0e1ea",
          "url": "https://git.kernel.org/stable/c/bab220b0bb5af652007e278e8e8357f952b0e1ea"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d8992c9a01f81128f36acb7c5755530e21fcd059",
          "url": "https://git.kernel.org/stable/c/d8992c9a01f81128f36acb7c5755530e21fcd059"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-05T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53090",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdkfd: Fix an illegal memory access\n\nIn the kfd_wait_on_events() function, the kfd_event_waiter structure is\nallocated by alloc_event_waiters(), but the event field of the waiter\nstructure is not initialized; When copy_from_user() fails in the\nkfd_wait_on_events() function, it will enter exception handling to\nrelease the previously allocated memory of the waiter structure;\nDue to the event field of the waiters structure being accessed\nin the free_waiters() function, this results in illegal memory access\nand system crash, here is the crash log:\n\nlocalhost kernel: RIP: 0010:native_queued_spin_lock_slowpath+0x185/0x1e0\nlocalhost kernel: RSP: 0018:ffffaa53c362bd60 EFLAGS: 00010082\nlocalhost kernel: RAX: ff3d3d6bff4007cb RBX: 0000000000000282 RCX: 00000000002c0000\nlocalhost kernel: RDX: ffff9e855eeacb80 RSI: 000000000000279c RDI: ffffe7088f6a21d0\nlocalhost kernel: RBP: ffffe7088f6a21d0 R08: 00000000002c0000 R09: ffffaa53c362be64\nlocalhost kernel: R10: ffffaa53c362bbd8 R11: 0000000000000001 R12: 0000000000000002\nlocalhost kernel: R13: ffff9e7ead15d600 R14: 0000000000000000 R15: ffff9e7ead15d698\nlocalhost kernel: FS:  0000152a3d111700(0000) GS:ffff9e855ee80000(0000) knlGS:0000000000000000\nlocalhost kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nlocalhost kernel: CR2: 0000152938000010 CR3: 000000044d7a4000 CR4: 00000000003506e0\nlocalhost kernel: Call Trace:\nlocalhost kernel: _raw_spin_lock_irqsave+0x30/0x40\nlocalhost kernel: remove_wait_queue+0x12/0x50\nlocalhost kernel: kfd_wait_on_events+0x1b6/0x490 [hydcu]\nlocalhost kernel: ? ftrace_graph_caller+0xa0/0xa0\nlocalhost kernel: kfd_ioctl+0x38c/0x4a0 [hydcu]\nlocalhost kernel: ? kfd_ioctl_set_trap_handler+0x70/0x70 [hydcu]\nlocalhost kernel: ? kfd_ioctl_create_queue+0x5a0/0x5a0 [hydcu]\nlocalhost kernel: ? ftrace_graph_caller+0xa0/0xa0\nlocalhost kernel: __x64_sys_ioctl+0x8e/0xd0\nlocalhost kernel: ? syscall_trace_enter.isra.18+0x143/0x1b0\nlocalhost kernel: do_syscall_64+0x33/0x80\nlocalhost kernel: entry_SYSCALL_64_after_hwframe+0x44/0xa9\nlocalhost kernel: RIP: 0033:0x152a4dff68d7\n\nAllocate the structure with kcalloc, and remove redundant 0-initialization\nand a redundant loop condition check.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53090"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2fece63b55c5d74cd6f5de51159e2cde37e10555",
          "url": "https://git.kernel.org/stable/c/2fece63b55c5d74cd6f5de51159e2cde37e10555"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4fc8fff378b2f2039f2a666d9f8c570f4e58352c",
          "url": "https://git.kernel.org/stable/c/4fc8fff378b2f2039f2a666d9f8c570f4e58352c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5a3fb3b745af0ce46ec2e0c8e507bae45b937334",
          "url": "https://git.kernel.org/stable/c/5a3fb3b745af0ce46ec2e0c8e507bae45b937334"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/61f306f8df0d5559659c5578cf6d95236bcdcb25",
          "url": "https://git.kernel.org/stable/c/61f306f8df0d5559659c5578cf6d95236bcdcb25"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6936525142a015e854d0a23e9ad9ea0a28b3843d",
          "url": "https://git.kernel.org/stable/c/6936525142a015e854d0a23e9ad9ea0a28b3843d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bbf5eada4334a96e3a204b2307ff5b14dc380b0b",
          "url": "https://git.kernel.org/stable/c/bbf5eada4334a96e3a204b2307ff5b14dc380b0b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d9923e7214a870b312bf61f6a89c7554d0966985",
          "url": "https://git.kernel.org/stable/c/d9923e7214a870b312bf61f6a89c7554d0966985"
        }
      ],
      "release_date": "2025-05-02T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38103",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse()\n\nUpdate struct hid_descriptor to better reflect the mandatory and\noptional parts of the HID Descriptor as per USB HID 1.11 specification.\nNote: the kernel currently does not parse any optional HID class\ndescriptors, only the mandatory report descriptor.\n\nUpdate all references to member element desc[0] to rpt_desc.\n\nAdd test to verify bLength and bNumDescriptors values are valid.\n\nReplace the for loop with direct access to the mandatory HID class\ndescriptor member for the report descriptor. This eliminates the\npossibility of getting an out-of-bounds fault.\n\nAdd a warning message if the HID descriptor contains any unsupported\noptional HID class descriptors.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38103"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1df80d748f984290c895e843401824215dcfbfb0",
          "url": "https://git.kernel.org/stable/c/1df80d748f984290c895e843401824215dcfbfb0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/41827a2dbdd7880df9881506dee13bc88d4230bb",
          "url": "https://git.kernel.org/stable/c/41827a2dbdd7880df9881506dee13bc88d4230bb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/485e1b741eb838cbe1d6b0e81e5ab62ae6c095cf",
          "url": "https://git.kernel.org/stable/c/485e1b741eb838cbe1d6b0e81e5ab62ae6c095cf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4fa7831cf0ac71a0a345369d1a6084f2b096e55e",
          "url": "https://git.kernel.org/stable/c/4fa7831cf0ac71a0a345369d1a6084f2b096e55e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/74388368927e9c52a69524af5bbd6c55eb4690de",
          "url": "https://git.kernel.org/stable/c/74388368927e9c52a69524af5bbd6c55eb4690de"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7a6d6b68db128da2078ccd9a751dfa3f75c9cf5b",
          "url": "https://git.kernel.org/stable/c/7a6d6b68db128da2078ccd9a751dfa3f75c9cf5b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a8f842534807985d3a676006d140541b87044345",
          "url": "https://git.kernel.org/stable/c/a8f842534807985d3a676006d140541b87044345"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fe7f7ac8e0c708446ff017453add769ffc15deed",
          "url": "https://git.kernel.org/stable/c/fe7f7ac8e0c708446ff017453add769ffc15deed"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-03T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53138",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: caif: Fix use-after-free in cfusbl_device_notify()\n\nsyzbot reported use-after-free in cfusbl_device_notify() [1].  This\ncauses a stack trace like below:\n\nBUG: KASAN: use-after-free in cfusbl_device_notify+0x7c9/0x870 net/caif/caif_usb.c:138\nRead of size 8 at addr ffff88807ac4e6f0 by task kworker/u4:6/1214\n\nCPU: 0 PID: 1214 Comm: kworker/u4:6 Not tainted 5.19.0-rc3-syzkaller-00146-g92f20ff72066 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nWorkqueue: netns cleanup_net\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\n print_address_description.constprop.0.cold+0xeb/0x467 mm/kasan/report.c:313\n print_report mm/kasan/report.c:429 [inline]\n kasan_report.cold+0xf4/0x1c6 mm/kasan/report.c:491\n cfusbl_device_notify+0x7c9/0x870 net/caif/caif_usb.c:138\n notifier_call_chain+0xb5/0x200 kernel/notifier.c:87\n call_netdevice_notifiers_info+0xb5/0x130 net/core/dev.c:1945\n call_netdevice_notifiers_extack net/core/dev.c:1983 [inline]\n call_netdevice_notifiers net/core/dev.c:1997 [inline]\n netdev_wait_allrefs_any net/core/dev.c:10227 [inline]\n netdev_run_todo+0xbc0/0x10f0 net/core/dev.c:10341\n default_device_exit_batch+0x44e/0x590 net/core/dev.c:11334\n ops_exit_list+0x125/0x170 net/core/net_namespace.c:167\n cleanup_net+0x4ea/0xb00 net/core/net_namespace.c:594\n process_one_work+0x996/0x1610 kernel/workqueue.c:2289\n worker_thread+0x665/0x1080 kernel/workqueue.c:2436\n kthread+0x2e9/0x3a0 kernel/kthread.c:376\n ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:302\n </TASK>\n\nWhen unregistering a net device, unregister_netdevice_many_notify()\nsets the device's reg_state to NETREG_UNREGISTERING, calls notifiers\nwith NETDEV_UNREGISTER, and adds the device to the todo list.\n\nLater on, devices in the todo list are processed by netdev_run_todo().\nnetdev_run_todo() waits devices' reference count become 1 while\nrebdoadcasting NETDEV_UNREGISTER notification.\n\nWhen cfusbl_device_notify() is called with NETDEV_UNREGISTER multiple\ntimes, the parent device might be freed.  This could cause UAF.\nProcessing NETDEV_UNREGISTER multiple times also causes inbalance of\nreference count for the module.\n\nThis patch fixes the issue by accepting only first NETDEV_UNREGISTER\nnotification.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53138"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1793da97a23e31c5bf06631f3f3e5a25f368fd64",
          "url": "https://git.kernel.org/stable/c/1793da97a23e31c5bf06631f3f3e5a25f368fd64"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/287027d8a567168a5d8ce5cb0cba16a34791a48c",
          "url": "https://git.kernel.org/stable/c/287027d8a567168a5d8ce5cb0cba16a34791a48c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3f14457e1584224f4296af613bbd99deb60b5d91",
          "url": "https://git.kernel.org/stable/c/3f14457e1584224f4296af613bbd99deb60b5d91"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/68a45c3cf0e2242a533657f4f535d9b6a7447a79",
          "url": "https://git.kernel.org/stable/c/68a45c3cf0e2242a533657f4f535d9b6a7447a79"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9781e98a97110f5e76999058368b4be76a788484",
          "url": "https://git.kernel.org/stable/c/9781e98a97110f5e76999058368b4be76a788484"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9dc16be373b382ddd4c274052a6e870a95e76c01",
          "url": "https://git.kernel.org/stable/c/9dc16be373b382ddd4c274052a6e870a95e76c01"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c3aaec463a632cf4187dc017e421bfa69d7834a9",
          "url": "https://git.kernel.org/stable/c/c3aaec463a632cf4187dc017e421bfa69d7834a9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d1a11bbdbb5ea9f172019c5a4a3e9d8eabd72179",
          "url": "https://git.kernel.org/stable/c/d1a11bbdbb5ea9f172019c5a4a3e9d8eabd72179"
        }
      ],
      "release_date": "2025-05-02T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-43883",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: vhci-hcd: Do not drop references before new references are gained\n\nAt a few places the driver carries stale pointers\nto references that can still be used. Make sure that does not happen.\nThis strictly speaking closes ZDI-CAN-22273, though there may be\nsimilar races in the driver.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-43883"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/128e82e41cf7d74a562726c1587d9d2ede1a0a37",
          "url": "https://git.kernel.org/stable/c/128e82e41cf7d74a562726c1587d9d2ede1a0a37"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4dacdb9720aaab10b6be121eae55820174d97174",
          "url": "https://git.kernel.org/stable/c/4dacdb9720aaab10b6be121eae55820174d97174"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/585e6bc7d0a9bf73a8be3d3fb34e86b90cc61a14",
          "url": "https://git.kernel.org/stable/c/585e6bc7d0a9bf73a8be3d3fb34e86b90cc61a14"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5a3c473b28ae1c1f7c4dc129e30cb19ae6e96f89",
          "url": "https://git.kernel.org/stable/c/5a3c473b28ae1c1f7c4dc129e30cb19ae6e96f89"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9c3746ce8d8fcb3a2405644fc0eec7fc5312de80",
          "url": "https://git.kernel.org/stable/c/9c3746ce8d8fcb3a2405644fc0eec7fc5312de80"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/afdcfd3d6fcdeca2735ca8d994c5f2d24a368f0a",
          "url": "https://git.kernel.org/stable/c/afdcfd3d6fcdeca2735ca8d994c5f2d24a368f0a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c3d0857b7fc2c49f68f89128a5440176089a8f54",
          "url": "https://git.kernel.org/stable/c/c3d0857b7fc2c49f68f89128a5440176089a8f54"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e8c1e606dab8c56cf074b43b98d0805de7322ba2",
          "url": "https://git.kernel.org/stable/c/e8c1e606dab8c56cf074b43b98d0805de7322ba2"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
        }
      ],
      "release_date": "2024-08-23T13:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53373",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: seqiv - Handle EBUSY correctly\n\nAs it is seqiv only handles the special return value of EINPROGERSS,\nwhich means that in all other cases it will free data related to the\nrequest.\n\nHowever, as the caller of seqiv may specify MAY_BACKLOG, we also need\nto expect EBUSY and treat it in the same way.  Otherwise backlogged\nrequests will trigger a use-after-free.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53373"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1effbddaff60eeef8017c6dea1ee0ed970164d14",
          "url": "https://git.kernel.org/stable/c/1effbddaff60eeef8017c6dea1ee0ed970164d14"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/32e62025e5e52fbe4812ef044759de7010b15dbc",
          "url": "https://git.kernel.org/stable/c/32e62025e5e52fbe4812ef044759de7010b15dbc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/36ec108b7bd7e280edb22de028467bd09d644620",
          "url": "https://git.kernel.org/stable/c/36ec108b7bd7e280edb22de028467bd09d644620"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4d497e8b200a175094e0ac252ed878add39b8771",
          "url": "https://git.kernel.org/stable/c/4d497e8b200a175094e0ac252ed878add39b8771"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/63551e4b7cbcd9914258827699eb2cb6ed6e4a16",
          "url": "https://git.kernel.org/stable/c/63551e4b7cbcd9914258827699eb2cb6ed6e4a16"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9477db935eb690f697d9bcc4f608927841bc8b36",
          "url": "https://git.kernel.org/stable/c/9477db935eb690f697d9bcc4f608927841bc8b36"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ae849d2f48019ff9c104e32bf588ccbfb200e971",
          "url": "https://git.kernel.org/stable/c/ae849d2f48019ff9c104e32bf588ccbfb200e971"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cc4d0d4251748a8a68026938f4055d2ac47c5719",
          "url": "https://git.kernel.org/stable/c/cc4d0d4251748a8a68026938f4055d2ac47c5719"
        }
      ],
      "release_date": "2025-09-18T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39817",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nefivarfs: Fix slab-out-of-bounds in efivarfs_d_compare\n\nObserved on kernel 6.6 (present on master as well):\n\n  BUG: KASAN: slab-out-of-bounds in memcmp+0x98/0xd0\n  Call trace:\n   kasan_check_range+0xe8/0x190\n   __asan_loadN+0x1c/0x28\n   memcmp+0x98/0xd0\n   efivarfs_d_compare+0x68/0xd8\n   __d_lookup_rcu_op_compare+0x178/0x218\n   __d_lookup_rcu+0x1f8/0x228\n   d_alloc_parallel+0x150/0x648\n   lookup_open.isra.0+0x5f0/0x8d0\n   open_last_lookups+0x264/0x828\n   path_openat+0x130/0x3f8\n   do_filp_open+0x114/0x248\n   do_sys_openat2+0x340/0x3c0\n   __arm64_sys_openat+0x120/0x1a0\n\nIf dentry->d_name.len < EFI_VARIABLE_GUID_LEN , 'guid' can become\nnegative, leadings to oob. The issue can be triggered by parallel\nlookups using invalid filename:\n\n  T1\t\t\tT2\n  lookup_open\n   ->lookup\n    simple_lookup\n     d_add\n     // invalid dentry is added to hash list\n\n\t\t\tlookup_open\n\t\t\t d_alloc_parallel\n\t\t\t  __d_lookup_rcu\n\t\t\t   __d_lookup_rcu_op_compare\n\t\t\t    hlist_bl_for_each_entry_rcu\n\t\t\t    // invalid dentry can be retrieved\n\t\t\t     ->d_compare\n\t\t\t      efivarfs_d_compare\n\t\t\t      // oob\n\nFix it by checking 'guid' before cmp.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39817"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0f63fbabeaaaaaaf5b742a2f4c1b4590d50bf1f6",
          "url": "https://git.kernel.org/stable/c/0f63fbabeaaaaaaf5b742a2f4c1b4590d50bf1f6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/568e7761279b99c6daa3002290fd6d8047ddb6d2",
          "url": "https://git.kernel.org/stable/c/568e7761279b99c6daa3002290fd6d8047ddb6d2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/71581a82f38e5a4d807d71fc1bb59aead80ccf95",
          "url": "https://git.kernel.org/stable/c/71581a82f38e5a4d807d71fc1bb59aead80ccf95"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/794399019301944fd6d2e0d7a51b3327e26c410e",
          "url": "https://git.kernel.org/stable/c/794399019301944fd6d2e0d7a51b3327e26c410e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/925599eba46045930b850a98ae594d2e3028ac40",
          "url": "https://git.kernel.org/stable/c/925599eba46045930b850a98ae594d2e3028ac40"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a6358f8cf64850f3f27857b8ed8c1b08cfc4685c",
          "url": "https://git.kernel.org/stable/c/a6358f8cf64850f3f27857b8ed8c1b08cfc4685c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c2925cd6207079c3f4d040d082515db78d63afbf",
          "url": "https://git.kernel.org/stable/c/c2925cd6207079c3f4d040d082515db78d63afbf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d7f5e35e70507d10cbaff5f9e194ed54c4ee14f7",
          "url": "https://git.kernel.org/stable/c/d7f5e35e70507d10cbaff5f9e194ed54c4ee14f7"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-16T13:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37882",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: xhci: Fix isochronous Ring Underrun/Overrun event handling\n\nThe TRB pointer of these events points at enqueue at the time of error\noccurrence on xHCI 1.1+ HCs or it's NULL on older ones. By the time we\nare handling the event, a new TD may be queued at this ring position.\n\nI can trigger this race by rising interrupt moderation to increase IRQ\nhandling delay. Similar delay may occur naturally due to system load.\n\nIf this ever happens after a Missed Service Error, missed TDs will be\nskipped and the new TD processed as if it matched the event. It could\nbe given back prematurely, risking data loss or buffer UAF by the xHC.\n\nDon't complete TDs on xrun events and don't warn if queued TDs don't\nmatch the event's TRB pointer, which can be NULL or a link/no-op TRB.\nDon't warn if there are no queued TDs at all.\n\nNow that it's safe, also handle xrun events if the skip flag is clear.\nThis ensures completion of any TD stuck in 'error mid TD' state right\nbefore the xrun event, which could happen if a driver submits a finite\nnumber of URBs to a buggy HC and then an error occurs on the last TD.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37882"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/16a7a8e6c47fea5c847beb696c8c21a7a44c1915",
          "url": "https://git.kernel.org/stable/c/16a7a8e6c47fea5c847beb696c8c21a7a44c1915"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/39a080a2925c81b0f1da0add44722ef2b78e5454",
          "url": "https://git.kernel.org/stable/c/39a080a2925c81b0f1da0add44722ef2b78e5454"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/906dec15b9b321b546fd31a3c99ffc13724c7af4",
          "url": "https://git.kernel.org/stable/c/906dec15b9b321b546fd31a3c99ffc13724c7af4"
        }
      ],
      "release_date": "2025-05-09T07:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38702",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: fix potential buffer overflow in do_register_framebuffer()\n\nThe current implementation may lead to buffer overflow when:\n1.  Unregistration creates NULL gaps in registered_fb[]\n2.  All array slots become occupied despite num_registered_fb < FB_MAX\n3.  The registration loop exceeds array bounds\n\nAdd boundary check to prevent registered_fb[FB_MAX] access.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38702"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/248b2aab9b2af5ecf89d9d7955a2ff20c4b4a399",
          "url": "https://git.kernel.org/stable/c/248b2aab9b2af5ecf89d9d7955a2ff20c4b4a399"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2828a433c7d7a05b6f27c8148502095101dd0b09",
          "url": "https://git.kernel.org/stable/c/2828a433c7d7a05b6f27c8148502095101dd0b09"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/523b84dc7ccea9c4d79126d6ed1cf9033cf83b05",
          "url": "https://git.kernel.org/stable/c/523b84dc7ccea9c4d79126d6ed1cf9033cf83b05"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5c3f5a25c62230b7965804ce7a2e9305c3ca3961",
          "url": "https://git.kernel.org/stable/c/5c3f5a25c62230b7965804ce7a2e9305c3ca3961"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/806f85bdd3a60187c21437fc51baace11f659f35",
          "url": "https://git.kernel.org/stable/c/806f85bdd3a60187c21437fc51baace11f659f35"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cbe740de32bb0fb7a5213731ff5f26ea6718fca3",
          "url": "https://git.kernel.org/stable/c/cbe740de32bb0fb7a5213731ff5f26ea6718fca3"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39860",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix use-after-free in l2cap_sock_cleanup_listen()\n\nsyzbot reported the splat below without a repro.\n\nIn the splat, a single thread calling bt_accept_dequeue() freed sk\nand touched it after that.\n\nThe root cause would be the racy l2cap_sock_cleanup_listen() call\nadded by the cited commit.\n\nbt_accept_dequeue() is called under lock_sock() except for\nl2cap_sock_release().\n\nTwo threads could see the same socket during the list iteration\nin bt_accept_dequeue():\n\n  CPU1                        CPU2 (close())\n  ----                        ----\n  sock_hold(sk)               sock_hold(sk);\n  lock_sock(sk)   <-- block close()\n  sock_put(sk)\n  bt_accept_unlink(sk)\n    sock_put(sk)  <-- refcnt by bt_accept_enqueue()\n  release_sock(sk)\n                              lock_sock(sk)\n                              sock_put(sk)\n                              bt_accept_unlink(sk)\n                                sock_put(sk)        <-- last refcnt\n                              bt_accept_unlink(sk)  <-- UAF\n\nDepending on the timing, the other thread could show up in the\n\"Freed by task\" part.\n\nLet's call l2cap_sock_cleanup_listen() under lock_sock() in\nl2cap_sock_release().\n\n[0]:\nBUG: KASAN: slab-use-after-free in debug_spin_lock_before kernel/locking/spinlock_debug.c:86 [inline]\nBUG: KASAN: slab-use-after-free in do_raw_spin_lock+0x26f/0x2b0 kernel/locking/spinlock_debug.c:115\nRead of size 4 at addr ffff88803b7eb1c4 by task syz.5.3276/16995\nCPU: 3 UID: 0 PID: 16995 Comm: syz.5.3276 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xcd/0x630 mm/kasan/report.c:482\n kasan_report+0xe0/0x110 mm/kasan/report.c:595\n debug_spin_lock_before kernel/locking/spinlock_debug.c:86 [inline]\n do_raw_spin_lock+0x26f/0x2b0 kernel/locking/spinlock_debug.c:115\n spin_lock_bh include/linux/spinlock.h:356 [inline]\n release_sock+0x21/0x220 net/core/sock.c:3746\n bt_accept_dequeue+0x505/0x600 net/bluetooth/af_bluetooth.c:312\n l2cap_sock_cleanup_listen+0x5c/0x2a0 net/bluetooth/l2cap_sock.c:1451\n l2cap_sock_release+0x5c/0x210 net/bluetooth/l2cap_sock.c:1425\n __sock_release+0xb3/0x270 net/socket.c:649\n sock_close+0x1c/0x30 net/socket.c:1439\n __fput+0x3ff/0xb70 fs/file_table.c:468\n task_work_run+0x14d/0x240 kernel/task_work.c:227\n resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]\n exit_to_user_mode_loop+0xeb/0x110 kernel/entry/common.c:43\n exit_to_user_mode_prepare include/linux/irq-entry-common.h:225 [inline]\n syscall_exit_to_user_mode_work include/linux/entry-common.h:175 [inline]\n syscall_exit_to_user_mode include/linux/entry-common.h:210 [inline]\n do_syscall_64+0x3f6/0x4c0 arch/x86/entry/syscall_64.c:100\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f2accf8ebe9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007ffdb6cb1378 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4\nRAX: 0000000000000000 RBX: 00000000000426fb RCX: 00007f2accf8ebe9\nRDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003\nRBP: 00007f2acd1b7da0 R08: 0000000000000001 R09: 00000012b6cb166f\nR10: 0000001b30e20000 R11: 0000000000000246 R12: 00007f2acd1b609c\nR13: 00007f2acd1b6090 R14: ffffffffffffffff R15: 00007ffdb6cb1490\n </TASK>\n\nAllocated by task 5326:\n kasan_save_stack+0x33/0x60 mm/kasan/common.c:47\n kasan_save_track+0x14/0x30 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:388 [inline]\n __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:405\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __do_kmalloc_node mm/slub.c:4365 [inline]\n __kmalloc_nopro\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39860"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2ca99fc3512a8074de20ee52a87b492dfcc41a4d",
          "url": "https://git.kernel.org/stable/c/2ca99fc3512a8074de20ee52a87b492dfcc41a4d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/306b0991413b482dbf5585b423022123bb505966",
          "url": "https://git.kernel.org/stable/c/306b0991413b482dbf5585b423022123bb505966"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3dff390f55ccd9ce12e91233849769b5312180c2",
          "url": "https://git.kernel.org/stable/c/3dff390f55ccd9ce12e91233849769b5312180c2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/47f6090bcf75c369695d21c3f179db8a56bbbd49",
          "url": "https://git.kernel.org/stable/c/47f6090bcf75c369695d21c3f179db8a56bbbd49"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6077d16b5c0f65d571eee709de2f0541fb5ef0ca",
          "url": "https://git.kernel.org/stable/c/6077d16b5c0f65d571eee709de2f0541fb5ef0ca"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/83e1d9892ef51785cf0760b7681436760dda435a",
          "url": "https://git.kernel.org/stable/c/83e1d9892ef51785cf0760b7681436760dda435a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/862c628108562d8c7a516a900034823b381d3cba",
          "url": "https://git.kernel.org/stable/c/862c628108562d8c7a516a900034823b381d3cba"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/964cbb198f9c46c2b2358cd1faffc04c1e8248cf",
          "url": "https://git.kernel.org/stable/c/964cbb198f9c46c2b2358cd1faffc04c1e8248cf"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-19T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53116",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet: avoid potential UAF in nvmet_req_complete()\n\nAn nvme target ->queue_response() operation implementation may free the\nrequest passed as argument. Such implementation potentially could result\nin a use after free of the request pointer when percpu_ref_put() is\ncalled in nvmet_req_complete().\n\nAvoid such problem by using a local variable to save the sq pointer\nbefore calling __nvmet_req_complete(), thus avoiding dereferencing the\nreq pointer after that function call.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53116"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/04c394208831d5e0d5cfee46722eb0f033cd4083",
          "url": "https://git.kernel.org/stable/c/04c394208831d5e0d5cfee46722eb0f033cd4083"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6173a77b7e9d3e202bdb9897b23f2a8afe7bf286",
          "url": "https://git.kernel.org/stable/c/6173a77b7e9d3e202bdb9897b23f2a8afe7bf286"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8ed9813871038b25a934b21ab76b5b7dbf44fc3a",
          "url": "https://git.kernel.org/stable/c/8ed9813871038b25a934b21ab76b5b7dbf44fc3a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a6317235da8aa7cb97529ebc8121cc2a4c4c437a",
          "url": "https://git.kernel.org/stable/c/a6317235da8aa7cb97529ebc8121cc2a4c4c437a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bcd535f07c58342302a2cd2bdd8894fe0872c8a9",
          "url": "https://git.kernel.org/stable/c/bcd535f07c58342302a2cd2bdd8894fe0872c8a9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e5d99b29012bbf0e86929403209723b2806500c1",
          "url": "https://git.kernel.org/stable/c/e5d99b29012bbf0e86929403209723b2806500c1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f1d5888a5efe345b63c430b256e95acb0a475642",
          "url": "https://git.kernel.org/stable/c/f1d5888a5efe345b63c430b256e95acb0a475642"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fafcb4b26393870c45462f9af6a48e581dbbcf7e",
          "url": "https://git.kernel.org/stable/c/fafcb4b26393870c45462f9af6a48e581dbbcf7e"
        }
      ],
      "release_date": "2025-05-02T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38529",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: aio_iiro_16: Fix bit shift out of bounds\n\nWhen checking for a supported IRQ number, the following test is used:\n\n\tif ((1 << it->options[1]) & 0xdcfc) {\n\nHowever, `it->options[i]` is an unchecked `int` value from userspace, so\nthe shift amount could be negative or out of bounds.  Fix the test by\nrequiring `it->options[1]` to be within bounds before proceeding with\nthe original test.  Valid `it->options[1]` values that select the IRQ\nwill be in the range [1,15]. The value 0 explicitly disables the use of\ninterrupts.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38529"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/43ddd82e6a91913cea1c078e782afd8de60c3a53",
          "url": "https://git.kernel.org/stable/c/43ddd82e6a91913cea1c078e782afd8de60c3a53"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5ac7c60439236fb691b8c7987390e2327bbf18fa",
          "url": "https://git.kernel.org/stable/c/5ac7c60439236fb691b8c7987390e2327bbf18fa"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/66acb1586737a22dd7b78abc63213b1bcaa100e4",
          "url": "https://git.kernel.org/stable/c/66acb1586737a22dd7b78abc63213b1bcaa100e4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/955e8835855fed8e87f7d8c8075564a1746c1b4c",
          "url": "https://git.kernel.org/stable/c/955e8835855fed8e87f7d8c8075564a1746c1b4c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a88692245c315bf8e225f205297a6f4b13d6856a",
          "url": "https://git.kernel.org/stable/c/a88692245c315bf8e225f205297a6f4b13d6856a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c593215385f0c0163015cca4512ed3ff42875d19",
          "url": "https://git.kernel.org/stable/c/c593215385f0c0163015cca4512ed3ff42875d19"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e0f3c0867d7d231c70984f05c97752caacd0daba",
          "url": "https://git.kernel.org/stable/c/e0f3c0867d7d231c70984f05c97752caacd0daba"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ff30dd3f15f443d2a0085b12ec2cc95d44f35fa7",
          "url": "https://git.kernel.org/stable/c/ff30dd3f15f443d2a0085b12ec2cc95d44f35fa7"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-08-16T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39839",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbatman-adv: fix OOB read/write in network-coding decode\n\nbatadv_nc_skb_decode_packet() trusts coded_len and checks only against\nskb->len. XOR starts at sizeof(struct batadv_unicast_packet), reducing\npayload headroom, and the source skb length is not verified, allowing an\nout-of-bounds read and a small out-of-bounds write.\n\nValidate that coded_len fits within the payload area of both destination\nand source sk_buffs before XORing.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39839"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1e36c6c8dc8023b4bbe9a16e819f9998b9b6a183",
          "url": "https://git.kernel.org/stable/c/1e36c6c8dc8023b4bbe9a16e819f9998b9b6a183"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/20080709457bc1e920eb002483d7d981d9b2ac1c",
          "url": "https://git.kernel.org/stable/c/20080709457bc1e920eb002483d7d981d9b2ac1c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/30fc47248f02b8a14a61df469e1da4704be1a19f",
          "url": "https://git.kernel.org/stable/c/30fc47248f02b8a14a61df469e1da4704be1a19f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5d334bce9fad58cf328d8fa14ea1fff855819863",
          "url": "https://git.kernel.org/stable/c/5d334bce9fad58cf328d8fa14ea1fff855819863"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a67c6397fcb7e842d3c595243049940970541c48",
          "url": "https://git.kernel.org/stable/c/a67c6397fcb7e842d3c595243049940970541c48"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bb37252c9af1cb250f34735ee98f80b46be3cef1",
          "url": "https://git.kernel.org/stable/c/bb37252c9af1cb250f34735ee98f80b46be3cef1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d77b6ff0ce35a6d0b0b7b9581bc3f76d041d4087",
          "url": "https://git.kernel.org/stable/c/d77b6ff0ce35a6d0b0b7b9581bc3f76d041d4087"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dce6c2aa70e94c04c523b375dfcc664d7a0a560a",
          "url": "https://git.kernel.org/stable/c/dce6c2aa70e94c04c523b375dfcc664d7a0a560a"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-19T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37817",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmcb: fix a double free bug in chameleon_parse_gdd()\n\nIn chameleon_parse_gdd(), if mcb_device_register() fails, 'mdev'\nwould be released in mcb_device_register() via put_device().\nThus, goto 'err' label and free 'mdev' again causes a double free.\nJust return if mcb_device_register() fails.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37817"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4ffe8c9fb561e4427dd1a3056cd5b3685b74f78d",
          "url": "https://git.kernel.org/stable/c/4ffe8c9fb561e4427dd1a3056cd5b3685b74f78d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/59f993cd36b6e28a394ba3d977e8ffe5c9884e3b",
          "url": "https://git.kernel.org/stable/c/59f993cd36b6e28a394ba3d977e8ffe5c9884e3b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7c7f1bfdb2249f854a736d9b79778c7e5a29a150",
          "url": "https://git.kernel.org/stable/c/7c7f1bfdb2249f854a736d9b79778c7e5a29a150"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/96838eb1836fd372e42be5db84f0b333b65146a6",
          "url": "https://git.kernel.org/stable/c/96838eb1836fd372e42be5db84f0b333b65146a6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bcc7d58ee5173e34306026bd01e1fbf75e169d37",
          "url": "https://git.kernel.org/stable/c/bcc7d58ee5173e34306026bd01e1fbf75e169d37"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c5b8a549ef1fcc6066b037a3962c79d60465ba0b",
          "url": "https://git.kernel.org/stable/c/c5b8a549ef1fcc6066b037a3962c79d60465ba0b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d70184958b0ea8c0fd52e2b456654b503e769fc8",
          "url": "https://git.kernel.org/stable/c/d70184958b0ea8c0fd52e2b456654b503e769fc8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/df1a5d5c6134224f9298e5189230f9d29ae50cac",
          "url": "https://git.kernel.org/stable/c/df1a5d5c6134224f9298e5189230f9d29ae50cac"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-08T07:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53559",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nip_vti: fix potential slab-use-after-free in decode_session6\n\nWhen ip_vti device is set to the qdisc of the sfb type, the cb field\nof the sent skb may be modified during enqueuing. Then,\nslab-use-after-free may occur when ip_vti device sends IPv6 packets.\nAs commit f855691975bb (\"xfrm6: Fix the nexthdr offset in\n_decode_session6.\") showed, xfrm_decode_session was originally intended\nonly for the receive path. IP6CB(skb)->nhoff is not set during\ntransmission. Therefore, set the cb field in the skb to 0 before\nsending packets.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53559"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0b4d69539fdea138af2befe08893850c89248068",
          "url": "https://git.kernel.org/stable/c/0b4d69539fdea138af2befe08893850c89248068"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2b05bf5dc437f7891dd409a3eaf5058459391c7a",
          "url": "https://git.kernel.org/stable/c/2b05bf5dc437f7891dd409a3eaf5058459391c7a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6018a266279b1a75143c7c0804dd08a5fc4c3e0b",
          "url": "https://git.kernel.org/stable/c/6018a266279b1a75143c7c0804dd08a5fc4c3e0b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/78e397a43e1c47321a4679cc49a6c4530bf820b9",
          "url": "https://git.kernel.org/stable/c/78e397a43e1c47321a4679cc49a6c4530bf820b9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7dfe23659f3677c08a60a0056cda2d91a79c15ca",
          "url": "https://git.kernel.org/stable/c/7dfe23659f3677c08a60a0056cda2d91a79c15ca"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/82fb41c5de243e7dfa90f32ca58e35adaff56c1d",
          "url": "https://git.kernel.org/stable/c/82fb41c5de243e7dfa90f32ca58e35adaff56c1d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d34c30442d5e53a33cde79ca163320dbe2432cbd",
          "url": "https://git.kernel.org/stable/c/d34c30442d5e53a33cde79ca163320dbe2432cbd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e1e04cc2ef2c0c0866c19f5627149a76c2baae32",
          "url": "https://git.kernel.org/stable/c/e1e04cc2ef2c0c0866c19f5627149a76c2baae32"
        }
      ],
      "release_date": "2025-10-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38697",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: upper bound check of tree index in dbAllocAG\n\nWhen computing the tree index in dbAllocAG, we never check if we are\nout of bounds realative to the size of the stree.\nThis could happen in a scenario where the filesystem metadata are\ncorrupted.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38697"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1467a75819e41341cd5ebd16faa2af1ca3c8f4fe",
          "url": "https://git.kernel.org/stable/c/1467a75819e41341cd5ebd16faa2af1ca3c8f4fe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/173cfd741ad7073640bfb7e2344c2a0ee005e769",
          "url": "https://git.kernel.org/stable/c/173cfd741ad7073640bfb7e2344c2a0ee005e769"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2dd05f09cc323018136a7ecdb3d1007be9ede27f",
          "url": "https://git.kernel.org/stable/c/2dd05f09cc323018136a7ecdb3d1007be9ede27f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/30e19a884c0b11f33821aacda7e72e914bec26ef",
          "url": "https://git.kernel.org/stable/c/30e19a884c0b11f33821aacda7e72e914bec26ef"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/49ea46d9025aa1914b24ea957636cbe4367a7311",
          "url": "https://git.kernel.org/stable/c/49ea46d9025aa1914b24ea957636cbe4367a7311"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5bdb9553fb134fd52ec208a8b378120670f6e784",
          "url": "https://git.kernel.org/stable/c/5bdb9553fb134fd52ec208a8b378120670f6e784"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a4f199203f79ca9cd7355799ccb26800174ff093",
          "url": "https://git.kernel.org/stable/c/a4f199203f79ca9cd7355799ccb26800174ff093"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c214006856ff52a8ff17ed8da52d50601d54f9ce",
          "url": "https://git.kernel.org/stable/c/c214006856ff52a8ff17ed8da52d50601d54f9ce"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c8ca21a2836993d7cb816668458e05e598574e55",
          "url": "https://git.kernel.org/stable/c/c8ca21a2836993d7cb816668458e05e598574e55"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38157",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k_htc: Abort software beacon handling if disabled\n\nA malicious USB device can send a WMI_SWBA_EVENTID event from an\nath9k_htc-managed device before beaconing has been enabled. This causes\na device-by-zero error in the driver, leading to either a crash or an\nout of bounds read.\n\nPrevent this by aborting the handling in ath9k_htc_swba() if beacons are\nnot enabled.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38157"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0281c19074976ec48f0078d50530b406ddae75bc",
          "url": "https://git.kernel.org/stable/c/0281c19074976ec48f0078d50530b406ddae75bc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/40471b23147c86ea3ed97faee79937c618250bd0",
          "url": "https://git.kernel.org/stable/c/40471b23147c86ea3ed97faee79937c618250bd0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5482ef9875eaa43f0435e14570e1193823de857e",
          "url": "https://git.kernel.org/stable/c/5482ef9875eaa43f0435e14570e1193823de857e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5a85c21f812e02cb00ca07007d88acdd42d08c46",
          "url": "https://git.kernel.org/stable/c/5a85c21f812e02cb00ca07007d88acdd42d08c46"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7ee3fb6258da8c890a51b514f60d7570dc703605",
          "url": "https://git.kernel.org/stable/c/7ee3fb6258da8c890a51b514f60d7570dc703605"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ac4e317a95a1092b5da5b9918b7118759342641c",
          "url": "https://git.kernel.org/stable/c/ac4e317a95a1092b5da5b9918b7118759342641c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e5ce9df1d68094d37360dbd9b09289d42fa21e54",
          "url": "https://git.kernel.org/stable/c/e5ce9df1d68094d37360dbd9b09289d42fa21e54"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ee5ee646385f5846dcbc881389f3c44a197c402a",
          "url": "https://git.kernel.org/stable/c/ee5ee646385f5846dcbc881389f3c44a197c402a"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-03T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37892",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: inftlcore: Add error check for inftl_read_oob()\n\nIn INFTL_findwriteunit(), the return value of inftl_read_oob()\nneed to be checked. A proper implementation can be\nfound in INFTL_deleteblock(). The status will be set as\nSECTOR_IGNORE to break from the while-loop correctly\nif the inftl_read_oob() fails.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37892"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0300e751170cf80c05ca1a762a7b449e8ca6b693",
          "url": "https://git.kernel.org/stable/c/0300e751170cf80c05ca1a762a7b449e8ca6b693"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/114d94f095aa405fa9a51484c4be34846d7bb386",
          "url": "https://git.kernel.org/stable/c/114d94f095aa405fa9a51484c4be34846d7bb386"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1c22356dfb041e5292835c9ff44d5f91bef8dd18",
          "url": "https://git.kernel.org/stable/c/1c22356dfb041e5292835c9ff44d5f91bef8dd18"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5479a6af3c96f73bec2d2819532b6d6814f52dd6",
          "url": "https://git.kernel.org/stable/c/5479a6af3c96f73bec2d2819532b6d6814f52dd6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6af3b92b1c0b58ca281d0e1501bad2567f73c1a5",
          "url": "https://git.kernel.org/stable/c/6af3b92b1c0b58ca281d0e1501bad2567f73c1a5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7772621041ee78823ccc5f1fe38f6faa22af7023",
          "url": "https://git.kernel.org/stable/c/7772621041ee78823ccc5f1fe38f6faa22af7023"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b828d394308e8e00df0a6f57e7dabae609bb8b7b",
          "url": "https://git.kernel.org/stable/c/b828d394308e8e00df0a6f57e7dabae609bb8b7b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d027951dc85cb2e15924c980dc22a6754d100c7c",
          "url": "https://git.kernel.org/stable/c/d027951dc85cb2e15924c980dc22a6754d100c7c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e7d6ceff95c55297f0ee8f9dbc4da5c558f30e9e",
          "url": "https://git.kernel.org/stable/c/e7d6ceff95c55297f0ee8f9dbc4da5c558f30e9e"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-20T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53604",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm integrity: call kmem_cache_destroy() in dm_integrity_init() error path\n\nOtherwise the journal_io_cache will leak if dm_register_target() fails.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53604"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3877b5c1509b16eeb1f275228fd91789cd88cf17",
          "url": "https://git.kernel.org/stable/c/3877b5c1509b16eeb1f275228fd91789cd88cf17"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/44f29e93a55b544dc961b6f8b4e93abaeaafb9ee",
          "url": "https://git.kernel.org/stable/c/44f29e93a55b544dc961b6f8b4e93abaeaafb9ee"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6b79a428c02769f2a11f8ae76bf866226d134887",
          "url": "https://git.kernel.org/stable/c/6b79a428c02769f2a11f8ae76bf866226d134887"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6d126899b0747305c9d39a0bcf87e0df9c3f555b",
          "url": "https://git.kernel.org/stable/c/6d126899b0747305c9d39a0bcf87e0df9c3f555b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a5d8c6bf58e5b2e70fbc15f3b08dfc1ba6f269ac",
          "url": "https://git.kernel.org/stable/c/a5d8c6bf58e5b2e70fbc15f3b08dfc1ba6f269ac"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c8c9c50268729bf35f6c9bb1205f490db920454e",
          "url": "https://git.kernel.org/stable/c/c8c9c50268729bf35f6c9bb1205f490db920454e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ca8b634fdf07dee3f6dfde57079c4511480b525e",
          "url": "https://git.kernel.org/stable/c/ca8b634fdf07dee3f6dfde57079c4511480b525e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e09a592fdd6c716506774bdbebb5f6c537b47767",
          "url": "https://git.kernel.org/stable/c/e09a592fdd6c716506774bdbebb5f6c537b47767"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ff4d6b5b38429a7731e5593680d2138bf74dd546",
          "url": "https://git.kernel.org/stable/c/ff4d6b5b38429a7731e5593680d2138bf74dd546"
        }
      ],
      "release_date": "2025-10-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38708",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrbd: add missing kref_get in handle_write_conflicts\n\nWith `two-primaries` enabled, DRBD tries to detect \"concurrent\" writes\nand handle write conflicts, so that even if you write to the same sector\nsimultaneously on both nodes, they end up with the identical data once\nthe writes are completed.\n\nIn handling \"superseeded\" writes, we forgot a kref_get,\nresulting in a premature drbd_destroy_device and use after free,\nand further to kernel crashes with symptoms.\n\nRelevance: No one should use DRBD as a random data generator, and apparently\nall users of \"two-primaries\" handle concurrent writes correctly on layer up.\nThat is cluster file systems use some distributed lock manager,\nand live migration in virtualization environments stops writes on one node\nbefore starting writes on the other node.\n\nWhich means that other than for \"test cases\",\nthis code path is never taken in real life.\n\nFYI, in DRBD 9, things are handled differently nowadays.  We still detect\n\"write conflicts\", but no longer try to be smart about them.\nWe decided to disconnect hard instead: upper layers must not submit concurrent\nwrites. If they do, that's their fault.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38708"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/00c9c9628b49e368d140cfa61d7df9b8922ec2a8",
          "url": "https://git.kernel.org/stable/c/00c9c9628b49e368d140cfa61d7df9b8922ec2a8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0336bfe9c237476bd7c45605a36ca79c2bca62e5",
          "url": "https://git.kernel.org/stable/c/0336bfe9c237476bd7c45605a36ca79c2bca62e5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3a896498f6f577e57bf26aaa93b48c22b6d20c20",
          "url": "https://git.kernel.org/stable/c/3a896498f6f577e57bf26aaa93b48c22b6d20c20"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/46e3763dcae0ffcf8fcfaff4fc10a90a92ffdd89",
          "url": "https://git.kernel.org/stable/c/46e3763dcae0ffcf8fcfaff4fc10a90a92ffdd89"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/57418de35420cedab035aa1da8a26c0499b7f575",
          "url": "https://git.kernel.org/stable/c/57418de35420cedab035aa1da8a26c0499b7f575"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7d483ad300fc0a06f69b019dda8f74970714baf8",
          "url": "https://git.kernel.org/stable/c/7d483ad300fc0a06f69b019dda8f74970714baf8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/810cd546a29bfac90ed1328ea01d693d4bd11cb1",
          "url": "https://git.kernel.org/stable/c/810cd546a29bfac90ed1328ea01d693d4bd11cb1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/84ef8dd3238330d1795745ece83b19f0295751bf",
          "url": "https://git.kernel.org/stable/c/84ef8dd3238330d1795745ece83b19f0295751bf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9f53b2433ad248cd3342cc345f56f5c7904bd8c4",
          "url": "https://git.kernel.org/stable/c/9f53b2433ad248cd3342cc345f56f5c7904bd8c4"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39824",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: asus: fix UAF via HID_CLAIMED_INPUT validation\n\nAfter hid_hw_start() is called hidinput_connect() will eventually be\ncalled to set up the device with the input layer since the\nHID_CONNECT_DEFAULT connect mask is used. During hidinput_connect()\nall input and output reports are processed and corresponding hid_inputs\nare allocated and configured via hidinput_configure_usages(). This\nprocess involves slot tagging report fields and configuring usages\nby setting relevant bits in the capability bitmaps. However it is possible\nthat the capability bitmaps are not set at all leading to the subsequent\nhidinput_has_been_populated() check to fail leading to the freeing of the\nhid_input and the underlying input device.\n\nThis becomes problematic because a malicious HID device like a\nASUS ROG N-Key keyboard can trigger the above scenario via a\nspecially crafted descriptor which then leads to a user-after-free\nwhen the name of the freed input device is written to later on after\nhid_hw_start(). Below, report 93 intentionally utilises the\nHID_UP_UNDEFINED Usage Page which is skipped during usage\nconfiguration, leading to the frees.\n\n0x05, 0x0D,        // Usage Page (Digitizer)\n0x09, 0x05,        // Usage (Touch Pad)\n0xA1, 0x01,        // Collection (Application)\n0x85, 0x0D,        //   Report ID (13)\n0x06, 0x00, 0xFF,  //   Usage Page (Vendor Defined 0xFF00)\n0x09, 0xC5,        //   Usage (0xC5)\n0x15, 0x00,        //   Logical Minimum (0)\n0x26, 0xFF, 0x00,  //   Logical Maximum (255)\n0x75, 0x08,        //   Report Size (8)\n0x95, 0x04,        //   Report Count (4)\n0xB1, 0x02,        //   Feature (Data,Var,Abs)\n0x85, 0x5D,        //   Report ID (93)\n0x06, 0x00, 0x00,  //   Usage Page (Undefined)\n0x09, 0x01,        //   Usage (0x01)\n0x15, 0x00,        //   Logical Minimum (0)\n0x26, 0xFF, 0x00,  //   Logical Maximum (255)\n0x75, 0x08,        //   Report Size (8)\n0x95, 0x1B,        //   Report Count (27)\n0x81, 0x02,        //   Input (Data,Var,Abs)\n0xC0,              // End Collection\n\nBelow is the KASAN splat after triggering the UAF:\n\n[   21.672709] ==================================================================\n[   21.673700] BUG: KASAN: slab-use-after-free in asus_probe+0xeeb/0xf80\n[   21.673700] Write of size 8 at addr ffff88810a0ac000 by task kworker/1:2/54\n[   21.673700]\n[   21.673700] CPU: 1 UID: 0 PID: 54 Comm: kworker/1:2 Not tainted 6.16.0-rc4-g9773391cf4dd-dirty #36 PREEMPT(voluntary)\n[   21.673700] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\n[   21.673700] Call Trace:\n[   21.673700]  <TASK>\n[   21.673700]  dump_stack_lvl+0x5f/0x80\n[   21.673700]  print_report+0xd1/0x660\n[   21.673700]  kasan_report+0xe5/0x120\n[   21.673700]  __asan_report_store8_noabort+0x1b/0x30\n[   21.673700]  asus_probe+0xeeb/0xf80\n[   21.673700]  hid_device_probe+0x2ee/0x700\n[   21.673700]  really_probe+0x1c6/0x6b0\n[   21.673700]  __driver_probe_device+0x24f/0x310\n[   21.673700]  driver_probe_device+0x4e/0x220\n[...]\n[   21.673700]\n[   21.673700] Allocated by task 54:\n[   21.673700]  kasan_save_stack+0x3d/0x60\n[   21.673700]  kasan_save_track+0x18/0x40\n[   21.673700]  kasan_save_alloc_info+0x3b/0x50\n[   21.673700]  __kasan_kmalloc+0x9c/0xa0\n[   21.673700]  __kmalloc_cache_noprof+0x139/0x340\n[   21.673700]  input_allocate_device+0x44/0x370\n[   21.673700]  hidinput_connect+0xcb6/0x2630\n[   21.673700]  hid_connect+0xf74/0x1d60\n[   21.673700]  hid_hw_start+0x8c/0x110\n[   21.673700]  asus_probe+0x5a3/0xf80\n[   21.673700]  hid_device_probe+0x2ee/0x700\n[   21.673700]  really_probe+0x1c6/0x6b0\n[   21.673700]  __driver_probe_device+0x24f/0x310\n[   21.673700]  driver_probe_device+0x4e/0x220\n[...]\n[   21.673700]\n[   21.673700] Freed by task 54:\n[   21.673700]  kasan_save_stack+0x3d/0x60\n[   21.673700]  kasan_save_track+0x18/0x40\n[   21.673700]  kasan_save_free_info+0x3f/0x60\n[   21.673700]  __kasan_slab_free+0x3c/0x50\n[   21.673700]  kfre\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39824"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5f3c0839b173f7f33415eb098331879e547d1d2d",
          "url": "https://git.kernel.org/stable/c/5f3c0839b173f7f33415eb098331879e547d1d2d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7170122e2ae4ab378c9cdf7cc54dea8b0abbbca5",
          "url": "https://git.kernel.org/stable/c/7170122e2ae4ab378c9cdf7cc54dea8b0abbbca5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/72a4ec018c9e9bc52f4f80eb3afb5d6a6b752275",
          "url": "https://git.kernel.org/stable/c/72a4ec018c9e9bc52f4f80eb3afb5d6a6b752275"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9a9e4a8317437bf944fa017c66e1e23a0368b5c7",
          "url": "https://git.kernel.org/stable/c/9a9e4a8317437bf944fa017c66e1e23a0368b5c7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a8ca8fe7f516d27ece3afb995c3bd4d07dcbe62c",
          "url": "https://git.kernel.org/stable/c/a8ca8fe7f516d27ece3afb995c3bd4d07dcbe62c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c0d77e3441a92d0b4958193c9ac1c3f81c6f1d1c",
          "url": "https://git.kernel.org/stable/c/c0d77e3441a92d0b4958193c9ac1c3f81c6f1d1c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d3af6ca9a8c34bbd8cff32b469b84c9021c9e7e4",
          "url": "https://git.kernel.org/stable/c/d3af6ca9a8c34bbd8cff32b469b84c9021c9e7e4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/eaae728e7335b5dbad70966e2bd520a731fdf7b2",
          "url": "https://git.kernel.org/stable/c/eaae728e7335b5dbad70966e2bd520a731fdf7b2"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-16T13:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39945",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncnic: Fix use-after-free bugs in cnic_delete_task\n\nThe original code uses cancel_delayed_work() in cnic_cm_stop_bnx2x_hw(),\nwhich does not guarantee that the delayed work item 'delete_task' has\nfully completed if it was already running. Additionally, the delayed work\nitem is cyclic, the flush_workqueue() in cnic_cm_stop_bnx2x_hw() only\nblocks and waits for work items that were already queued to the\nworkqueue prior to its invocation. Any work items submitted after\nflush_workqueue() is called are not included in the set of tasks that the\nflush operation awaits. This means that after the cyclic work items have\nfinished executing, a delayed work item may still exist in the workqueue.\nThis leads to use-after-free scenarios where the cnic_dev is deallocated\nby cnic_free_dev(), while delete_task remains active and attempt to\ndereference cnic_dev in cnic_delete_task().\n\nA typical race condition is illustrated below:\n\nCPU 0 (cleanup)              | CPU 1 (delayed work callback)\ncnic_netdev_event()          |\n  cnic_stop_hw()             | cnic_delete_task()\n    cnic_cm_stop_bnx2x_hw()  | ...\n      cancel_delayed_work()  | /* the queue_delayed_work()\n      flush_workqueue()      |    executes after flush_workqueue()*/\n                             | queue_delayed_work()\n  cnic_free_dev(dev)//free   | cnic_delete_task() //new instance\n                             |   dev = cp->dev; //use\n\nReplace cancel_delayed_work() with cancel_delayed_work_sync() to ensure\nthat the cyclic delayed work item is properly canceled and that any\nongoing execution of the work item completes before the cnic_dev is\ndeallocated. Furthermore, since cancel_delayed_work_sync() uses\n__flush_work(work, true) to synchronously wait for any currently\nexecuting instance of the work item to finish, the flush_workqueue()\nbecomes redundant and should be removed.\n\nThis bug was identified through static analysis. To reproduce the issue\nand validate the fix, I simulated the cnic PCI device in QEMU and\nintroduced intentional delays — such as inserting calls to ssleep()\nwithin the cnic_delete_task() function — to increase the likelihood\nof triggering the bug.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39945"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0405055930264ea8fd26f4131466fa7652e5e47d",
          "url": "https://git.kernel.org/stable/c/0405055930264ea8fd26f4131466fa7652e5e47d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0627e1481676669cae2df0d85b5ff13e7d24c390",
          "url": "https://git.kernel.org/stable/c/0627e1481676669cae2df0d85b5ff13e7d24c390"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6e33a7eed587062ca8161ad1f4584882a860d697",
          "url": "https://git.kernel.org/stable/c/6e33a7eed587062ca8161ad1f4584882a860d697"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7b6a5b0a6b392263c3767fc945b311ea04b34bbd",
          "url": "https://git.kernel.org/stable/c/7b6a5b0a6b392263c3767fc945b311ea04b34bbd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8eeb2091e72d75df8ceaa2172638d61b4cf8929a",
          "url": "https://git.kernel.org/stable/c/8eeb2091e72d75df8ceaa2172638d61b4cf8929a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cfa7d9b1e3a8604afc84e9e51d789c29574fb216",
          "url": "https://git.kernel.org/stable/c/cfa7d9b1e3a8604afc84e9e51d789c29574fb216"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e1fcd4a9c09feac0902a65615e866dbf22616125",
          "url": "https://git.kernel.org/stable/c/e1fcd4a9c09feac0902a65615e866dbf22616125"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fde6e73189f40ebcf0633aed2b68e731c25f3aa3",
          "url": "https://git.kernel.org/stable/c/fde6e73189f40ebcf0633aed2b68e731c25f3aa3"
        }
      ],
      "release_date": "2025-10-04T08:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53608",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix potential UAF of struct nilfs_sc_info in nilfs_segctor_thread()\n\nThe finalization of nilfs_segctor_thread() can race with\nnilfs_segctor_kill_thread() which terminates that thread, potentially\ncausing a use-after-free BUG as KASAN detected.\n\nAt the end of nilfs_segctor_thread(), it assigns NULL to \"sc_task\" member\nof \"struct nilfs_sc_info\" to indicate the thread has finished, and then\nnotifies nilfs_segctor_kill_thread() of this using waitqueue\n\"sc_wait_task\" on the struct nilfs_sc_info.\n\nHowever, here, immediately after the NULL assignment to \"sc_task\", it is\npossible that nilfs_segctor_kill_thread() will detect it and return to\ncontinue the deallocation, freeing the nilfs_sc_info structure before the\nthread does the notification.\n\nThis fixes the issue by protecting the NULL assignment to \"sc_task\" and\nits notification, with spinlock \"sc_state_lock\" of the struct\nnilfs_sc_info.  Since nilfs_segctor_kill_thread() does a final check to\nsee if \"sc_task\" is NULL with \"sc_state_lock\" locked, this can eliminate\nthe race.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53608"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/034cce77d52ba013ce62b4f5258c29907eb1ada5",
          "url": "https://git.kernel.org/stable/c/034cce77d52ba013ce62b4f5258c29907eb1ada5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0dbf0e64b91ee8fcb278aea93eb06fc7d56ecbcc",
          "url": "https://git.kernel.org/stable/c/0dbf0e64b91ee8fcb278aea93eb06fc7d56ecbcc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/613bf23c070d11c525268f2945aa594704a9b764",
          "url": "https://git.kernel.org/stable/c/613bf23c070d11c525268f2945aa594704a9b764"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6be49d100c22ffea3287a4b19d7639d259888e33",
          "url": "https://git.kernel.org/stable/c/6be49d100c22ffea3287a4b19d7639d259888e33"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/92684e02654c91a61a0b0561433b710bcece19fe",
          "url": "https://git.kernel.org/stable/c/92684e02654c91a61a0b0561433b710bcece19fe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b4d80bd6370b81a1725b6b8f7894802c23a14e9f",
          "url": "https://git.kernel.org/stable/c/b4d80bd6370b81a1725b6b8f7894802c23a14e9f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bae009a2f1b7c2011d2e92d8c84868d315c0b97e",
          "url": "https://git.kernel.org/stable/c/bae009a2f1b7c2011d2e92d8c84868d315c0b97e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f32297dba338dc06d62286dedb3cdbd5175b1719",
          "url": "https://git.kernel.org/stable/c/f32297dba338dc06d62286dedb3cdbd5175b1719"
        }
      ],
      "release_date": "2025-10-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38574",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npptp: ensure minimal skb length in pptp_xmit()\n\nCommit aabc6596ffb3 (\"net: ppp: Add bound checking for skb data\non ppp_sync_txmung\") fixed ppp_sync_txmunge()\n\nWe need a similar fix in pptp_xmit(), otherwise we might\nread uninit data as reported by syzbot.\n\nBUG: KMSAN: uninit-value in pptp_xmit+0xc34/0x2720 drivers/net/ppp/pptp.c:193\n  pptp_xmit+0xc34/0x2720 drivers/net/ppp/pptp.c:193\n  ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2290 [inline]\n  ppp_input+0x1d6/0xe60 drivers/net/ppp/ppp_generic.c:2314\n  pppoe_rcv_core+0x1e8/0x760 drivers/net/ppp/pppoe.c:379\n  sk_backlog_rcv+0x142/0x420 include/net/sock.h:1148\n  __release_sock+0x1d3/0x330 net/core/sock.c:3213\n  release_sock+0x6b/0x270 net/core/sock.c:3767\n  pppoe_sendmsg+0x15d/0xcb0 drivers/net/ppp/pppoe.c:904\n  sock_sendmsg_nosec net/socket.c:712 [inline]\n  __sock_sendmsg+0x330/0x3d0 net/socket.c:727\n  ____sys_sendmsg+0x893/0xd80 net/socket.c:2566\n  ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620\n  __sys_sendmmsg+0x2d9/0x7c0 net/socket.c:2709",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38574"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1a04db0fd75cb6034fc27a56b67b3b8b9022a98c",
          "url": "https://git.kernel.org/stable/c/1a04db0fd75cb6034fc27a56b67b3b8b9022a98c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/26672f1679b143aa34fca0b6046b7fd0c184770d",
          "url": "https://git.kernel.org/stable/c/26672f1679b143aa34fca0b6046b7fd0c184770d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5005d24377378a20e5c0e53052fc4ebdcdcbc611",
          "url": "https://git.kernel.org/stable/c/5005d24377378a20e5c0e53052fc4ebdcdcbc611"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/504cc4ab91073d2ac7404ad146139f86ecee7193",
          "url": "https://git.kernel.org/stable/c/504cc4ab91073d2ac7404ad146139f86ecee7193"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5de7513f38f3c19c0610294ee478242bea356f8c",
          "url": "https://git.kernel.org/stable/c/5de7513f38f3c19c0610294ee478242bea356f8c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/97b8c5d322c5c0038cac4bc56fdbe237d0be426f",
          "url": "https://git.kernel.org/stable/c/97b8c5d322c5c0038cac4bc56fdbe237d0be426f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b7dcda76fd0615c0599c89f36873a6cd48e02dbb",
          "url": "https://git.kernel.org/stable/c/b7dcda76fd0615c0599c89f36873a6cd48e02dbb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/de9c4861fb42f0cd72da844c3c34f692d5895b7b",
          "url": "https://git.kernel.org/stable/c/de9c4861fb42f0cd72da844c3c34f692d5895b7b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ea99b88b1999ebcb24d5d3a6b7910030f40d3bba",
          "url": "https://git.kernel.org/stable/c/ea99b88b1999ebcb24d5d3a6b7910030f40d3bba"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-08-19T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38459",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: clip: Fix infinite recursive call of clip_push().\n\nsyzbot reported the splat below. [0]\n\nThis happens if we call ioctl(ATMARP_MKIP) more than once.\n\nDuring the first call, clip_mkip() sets clip_push() to vcc->push(),\nand the second call copies it to clip_vcc->old_push().\n\nLater, when the socket is close()d, vcc_destroy_socket() passes\nNULL skb to clip_push(), which calls clip_vcc->old_push(),\ntriggering the infinite recursion.\n\nLet's prevent the second ioctl(ATMARP_MKIP) by checking\nvcc->user_back, which is allocated by the first call as clip_vcc.\n\nNote also that we use lock_sock() to prevent racy calls.\n\n[0]:\nBUG: TASK stack guard page was hit at ffffc9000d66fff8 (stack is ffffc9000d670000..ffffc9000d678000)\nOops: stack guard page: 0000 [#1] SMP KASAN NOPTI\nCPU: 0 UID: 0 PID: 5322 Comm: syz.0.0 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT(full)\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\nRIP: 0010:clip_push+0x5/0x720 net/atm/clip.c:191\nCode: e0 8f aa 8c e8 1c ad 5b fa eb ae 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 55 <41> 57 41 56 41 55 41 54 53 48 83 ec 20 48 89 f3 49 89 fd 48 bd 00\nRSP: 0018:ffffc9000d670000 EFLAGS: 00010246\nRAX: 1ffff1100235a4a5 RBX: ffff888011ad2508 RCX: ffff8880003c0000\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888037f01000\nRBP: dffffc0000000000 R08: ffffffff8fa104f7 R09: 1ffffffff1f4209e\nR10: dffffc0000000000 R11: ffffffff8a99b300 R12: ffffffff8a99b300\nR13: ffff888037f01000 R14: ffff888011ad2500 R15: ffff888037f01578\nFS:  000055557ab6d500(0000) GS:ffff88808d250000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffc9000d66fff8 CR3: 0000000043172000 CR4: 0000000000352ef0\nCall Trace:\n <TASK>\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n...\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n clip_push+0x6dc/0x720 net/atm/clip.c:200\n vcc_destroy_socket net/atm/common.c:183 [inline]\n vcc_release+0x157/0x460 net/atm/common.c:205\n __sock_release net/socket.c:647 [inline]\n sock_close+0xc0/0x240 net/socket.c:1391\n __fput+0x449/0xa70 fs/file_table.c:465\n task_work_run+0x1d1/0x260 kernel/task_work.c:227\n resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]\n exit_to_user_mode_loop+0xec/0x110 kernel/entry/common.c:114\n exit_to_user_mode_prepare include/linux/entry-common.h:330 [inline]\n syscall_exit_to_user_mode_work include/linux/entry-common.h:414 [inline]\n syscall_exit_to_user_mode include/linux/entry-common.h:449 [inline]\n do_syscall_64+0x2bd/0x3b0 arch/x86/entry/syscall_64.c:100\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7ff31c98e929\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fffb5aa1f78 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4\nRAX: 0000000000000000 RBX: 0000000000012747 RCX: 00007ff31c98e929\nRDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003\nRBP: 00007ff31cbb7ba0 R08: 0000000000000001 R09: 0000000db5aa226f\nR10: 00007ff31c7ff030 R11: 0000000000000246 R12: 00007ff31cbb608c\nR13: 00007ff31cbb6080 R14: ffffffffffffffff R15: 00007fffb5aa2090\n </TASK>\nModules linked in:",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38459"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/024876b247a882972095b22087734dcd23396a4e",
          "url": "https://git.kernel.org/stable/c/024876b247a882972095b22087734dcd23396a4e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/125166347d5676466d368aadc0bbc31ee7714352",
          "url": "https://git.kernel.org/stable/c/125166347d5676466d368aadc0bbc31ee7714352"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1579a2777cb914a249de22c789ba4d41b154509f",
          "url": "https://git.kernel.org/stable/c/1579a2777cb914a249de22c789ba4d41b154509f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3f61b997fe014bbfcc208a9fcbd363a1fe7e3a31",
          "url": "https://git.kernel.org/stable/c/3f61b997fe014bbfcc208a9fcbd363a1fe7e3a31"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5641019dfbaee5e85fe093b590f0451c9dd4d6f8",
          "url": "https://git.kernel.org/stable/c/5641019dfbaee5e85fe093b590f0451c9dd4d6f8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c489f3283dbfc0f3c00c312149cae90d27552c45",
          "url": "https://git.kernel.org/stable/c/c489f3283dbfc0f3c00c312149cae90d27552c45"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/df0312d8859763aa15b8b56ac151a1ea4a4e5b88",
          "url": "https://git.kernel.org/stable/c/df0312d8859763aa15b8b56ac151a1ea4a4e5b88"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f493f31a63847624fd3199ac836a8bd8828e50e2",
          "url": "https://git.kernel.org/stable/c/f493f31a63847624fd3199ac836a8bd8828e50e2"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-25T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37923",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix oob write in trace_seq_to_buffer()\n\nsyzbot reported this bug:\n==================================================================\nBUG: KASAN: slab-out-of-bounds in trace_seq_to_buffer kernel/trace/trace.c:1830 [inline]\nBUG: KASAN: slab-out-of-bounds in tracing_splice_read_pipe+0x6be/0xdd0 kernel/trace/trace.c:6822\nWrite of size 4507 at addr ffff888032b6b000 by task syz.2.320/7260\n\nCPU: 1 UID: 0 PID: 7260 Comm: syz.2.320 Not tainted 6.15.0-rc1-syzkaller-00301-g3bde70a2c827 #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:408 [inline]\n print_report+0xc3/0x670 mm/kasan/report.c:521\n kasan_report+0xe0/0x110 mm/kasan/report.c:634\n check_region_inline mm/kasan/generic.c:183 [inline]\n kasan_check_range+0xef/0x1a0 mm/kasan/generic.c:189\n __asan_memcpy+0x3c/0x60 mm/kasan/shadow.c:106\n trace_seq_to_buffer kernel/trace/trace.c:1830 [inline]\n tracing_splice_read_pipe+0x6be/0xdd0 kernel/trace/trace.c:6822\n ....\n==================================================================\n\nIt has been reported that trace_seq_to_buffer() tries to copy more data\nthan PAGE_SIZE to buf. Therefore, to prevent this, we should use the\nsmaller of trace_seq_used(&iter->seq) and PAGE_SIZE as an argument.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37923"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/056ebbddb8faf4ddf83d005454dd78fc25c2d897",
          "url": "https://git.kernel.org/stable/c/056ebbddb8faf4ddf83d005454dd78fc25c2d897"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1a3f9482b50b74fa9421bff8ceecfefd0dc06f8f",
          "url": "https://git.kernel.org/stable/c/1a3f9482b50b74fa9421bff8ceecfefd0dc06f8f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1f27a3e93b8d674b24b27fcdbc6f72743cd96c0d",
          "url": "https://git.kernel.org/stable/c/1f27a3e93b8d674b24b27fcdbc6f72743cd96c0d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/441021e5b3c7d9bd1b963590652c415929f3b157",
          "url": "https://git.kernel.org/stable/c/441021e5b3c7d9bd1b963590652c415929f3b157"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/665ce421041890571852422487f4c613d1824ba9",
          "url": "https://git.kernel.org/stable/c/665ce421041890571852422487f4c613d1824ba9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c5d2b66c5ef5037b4b4360e5447605ff00ba1bd4",
          "url": "https://git.kernel.org/stable/c/c5d2b66c5ef5037b4b4360e5447605ff00ba1bd4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f4b0174e9f18aaba59ee6ffdaf8827a7f94eb606",
          "url": "https://git.kernel.org/stable/c/f4b0174e9f18aaba59ee6ffdaf8827a7f94eb606"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f5178c41bb43444a6008150fe6094497135d07cb",
          "url": "https://git.kernel.org/stable/c/f5178c41bb43444a6008150fe6094497135d07cb"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        }
      ],
      "release_date": "2025-05-20T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38724",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()\n\nLei Lu recently reported that nfsd4_setclientid_confirm() did not check\nthe return value from get_client_locked(). a SETCLIENTID_CONFIRM could\nrace with a confirmed client expiring and fail to get a reference. That\ncould later lead to a UAF.\n\nFix this by getting a reference early in the case where there is an\nextant confirmed client. If that fails then treat it as if there were no\nconfirmed client found at all.\n\nIn the case where the unconfirmed client is expiring, just fail and\nreturn the result from get_client_locked().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38724"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/22f45cedf281e6171817c8a3432c44d788c550e1",
          "url": "https://git.kernel.org/stable/c/22f45cedf281e6171817c8a3432c44d788c550e1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/36e83eda90e0e4ac52f259f775b40b2841f8a0a3",
          "url": "https://git.kernel.org/stable/c/36e83eda90e0e4ac52f259f775b40b2841f8a0a3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3f252a73e81aa01660cb426735eab932e6182e8d",
          "url": "https://git.kernel.org/stable/c/3f252a73e81aa01660cb426735eab932e6182e8d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/571a5e46c71490285d2d8c06f6b5a7cbf6c7edd1",
          "url": "https://git.kernel.org/stable/c/571a5e46c71490285d2d8c06f6b5a7cbf6c7edd1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/74ad36ed60df561a303a19ecef400c7096b20306",
          "url": "https://git.kernel.org/stable/c/74ad36ed60df561a303a19ecef400c7096b20306"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/908e4ead7f757504d8b345452730636e298cbf68",
          "url": "https://git.kernel.org/stable/c/908e4ead7f757504d8b345452730636e298cbf68"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d35ac850410966010e92f401f4e21868a9ea4d8b",
          "url": "https://git.kernel.org/stable/c/d35ac850410966010e92f401f4e21868a9ea4d8b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d71abd1ae4e0413707cd42b10c24a11d1aa71772",
          "url": "https://git.kernel.org/stable/c/d71abd1ae4e0413707cd42b10c24a11d1aa71772"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f3aac6cf390d8b80e1d82975faf4ac61175519c0",
          "url": "https://git.kernel.org/stable/c/f3aac6cf390d8b80e1d82975faf4ac61175519c0"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38494",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: core: do not bypass hid_hw_raw_request\n\nhid_hw_raw_request() is actually useful to ensure the provided buffer\nand length are valid. Directly calling in the low level transport driver\nfunction bypassed those checks and allowed invalid paramto be used.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38494"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0e5017d84d650ca0eeaf4a3fe9264c5dbc886b81",
          "url": "https://git.kernel.org/stable/c/0e5017d84d650ca0eeaf4a3fe9264c5dbc886b81"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/19d1314d46c0d8a5c08ab53ddeb62280c77698c0",
          "url": "https://git.kernel.org/stable/c/19d1314d46c0d8a5c08ab53ddeb62280c77698c0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/40e25aa7e4e0f2440c73a683ee448e41c7c344ed",
          "url": "https://git.kernel.org/stable/c/40e25aa7e4e0f2440c73a683ee448e41c7c344ed"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a62a895edb2bfebffa865b5129a66e3b4287f34f",
          "url": "https://git.kernel.org/stable/c/a62a895edb2bfebffa865b5129a66e3b4287f34f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c2ca42f190b6714d6c481dfd3d9b62ea091c946b",
          "url": "https://git.kernel.org/stable/c/c2ca42f190b6714d6c481dfd3d9b62ea091c946b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d18f63e848840100dbc351a82e7042eac5a28cf5",
          "url": "https://git.kernel.org/stable/c/d18f63e848840100dbc351a82e7042eac5a28cf5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dd8e8314f2ce225dade5248dcfb9e2ac0edda624",
          "url": "https://git.kernel.org/stable/c/dd8e8314f2ce225dade5248dcfb9e2ac0edda624"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f10923b8d32a473b229477b63f23bbd72b1e9910",
          "url": "https://git.kernel.org/stable/c/f10923b8d32a473b229477b63f23bbd72b1e9910"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-28T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53554",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext()\n\nThe \"exc->key_len\" is a u16 that comes from the user.  If it's over\nIW_ENCODING_TOKEN_MAX (64) that could lead to memory corruption.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53554"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5373a1aa91b2298f9305794b8270cf9896be96b6",
          "url": "https://git.kernel.org/stable/c/5373a1aa91b2298f9305794b8270cf9896be96b6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5f1c7031e044cb2fba82836d55cc235e2ad619dc",
          "url": "https://git.kernel.org/stable/c/5f1c7031e044cb2fba82836d55cc235e2ad619dc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/663fff29fd613e2b0d30c4138157312ba93c4939",
          "url": "https://git.kernel.org/stable/c/663fff29fd613e2b0d30c4138157312ba93c4939"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7ae9f55a495077f838bab466411ee6f38574df9b",
          "url": "https://git.kernel.org/stable/c/7ae9f55a495077f838bab466411ee6f38574df9b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9496fb96ddeb740dc6b966f4a7d8dfb8b93921c6",
          "url": "https://git.kernel.org/stable/c/9496fb96ddeb740dc6b966f4a7d8dfb8b93921c6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b1b04b56745bc79286c80aa876fabfab1e08ebf1",
          "url": "https://git.kernel.org/stable/c/b1b04b56745bc79286c80aa876fabfab1e08ebf1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/baf420e30364ef9efe3e29a5c0e01e612aebf3fe",
          "url": "https://git.kernel.org/stable/c/baf420e30364ef9efe3e29a5c0e01e612aebf3fe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/caac4b6c15b66feae4d83f602e1e46f124540202",
          "url": "https://git.kernel.org/stable/c/caac4b6c15b66feae4d83f602e1e46f124540202"
        }
      ],
      "release_date": "2025-10-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39863",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work\n\nThe brcmf_btcoex_detach() only shuts down the btcoex timer, if the\nflag timer_on is false. However, the brcmf_btcoex_timerfunc(), which\nruns as timer handler, sets timer_on to false. This creates critical\nrace conditions:\n\n1.If brcmf_btcoex_detach() is called while brcmf_btcoex_timerfunc()\nis executing, it may observe timer_on as false and skip the call to\ntimer_shutdown_sync().\n\n2.The brcmf_btcoex_timerfunc() may then reschedule the brcmf_btcoex_info\nworker after the cancel_work_sync() has been executed, resulting in\nuse-after-free bugs.\n\nThe use-after-free bugs occur in two distinct scenarios, depending on\nthe timing of when the brcmf_btcoex_info struct is freed relative to\nthe execution of its worker thread.\n\nScenario 1: Freed before the worker is scheduled\n\nThe brcmf_btcoex_info is deallocated before the worker is scheduled.\nA race condition can occur when schedule_work(&bt_local->work) is\ncalled after the target memory has been freed. The sequence of events\nis detailed below:\n\nCPU0                           | CPU1\nbrcmf_btcoex_detach            | brcmf_btcoex_timerfunc\n                               |   bt_local->timer_on = false;\n  if (cfg->btcoex->timer_on)   |\n    ...                        |\n  cancel_work_sync();          |\n  ...                          |\n  kfree(cfg->btcoex); // FREE  |\n                               |   schedule_work(&bt_local->work); // USE\n\nScenario 2: Freed after the worker is scheduled\n\nThe brcmf_btcoex_info is freed after the worker has been scheduled\nbut before or during its execution. In this case, statements within\nthe brcmf_btcoex_handler() — such as the container_of macro and\nsubsequent dereferences of the brcmf_btcoex_info object will cause\na use-after-free access. The following timeline illustrates this\nscenario:\n\nCPU0                            | CPU1\nbrcmf_btcoex_detach             | brcmf_btcoex_timerfunc\n                                |   bt_local->timer_on = false;\n  if (cfg->btcoex->timer_on)    |\n    ...                         |\n  cancel_work_sync();           |\n  ...                           |   schedule_work(); // Reschedule\n                                |\n  kfree(cfg->btcoex); // FREE   |   brcmf_btcoex_handler() // Worker\n  /*                            |     btci = container_of(....); // USE\n   The kfree() above could      |     ...\n   also occur at any point      |     btci-> // USE\n   during the worker's execution|\n   */                           |\n\nTo resolve the race conditions, drop the conditional check and call\ntimer_shutdown_sync() directly. It can deactivate the timer reliably,\nregardless of its current state. Once stopped, the timer_on state is\nthen set to false.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39863"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2f6fbc8e04ca1d1d5c560be694199f847229c625",
          "url": "https://git.kernel.org/stable/c/2f6fbc8e04ca1d1d5c560be694199f847229c625"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3e789f8475f6c857c88de5c5bf4b24b11a477dd7",
          "url": "https://git.kernel.org/stable/c/3e789f8475f6c857c88de5c5bf4b24b11a477dd7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9cb83d4be0b9b697eae93d321e0da999f9cdfcfc",
          "url": "https://git.kernel.org/stable/c/9cb83d4be0b9b697eae93d321e0da999f9cdfcfc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f1150153c4e5940fe49ab51136343c5b4fe49d63",
          "url": "https://git.kernel.org/stable/c/f1150153c4e5940fe49ab51136343c5b4fe49d63"
        }
      ],
      "release_date": "2025-09-19T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38403",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/vmci: Clear the vmci transport packet properly when initializing it\n\nIn vmci_transport_packet_init memset the vmci_transport_packet before\npopulating the fields to avoid any uninitialised data being left in the\nstructure.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38403"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0a01021317375b8d1895152f544421ce49299eb1",
          "url": "https://git.kernel.org/stable/c/0a01021317375b8d1895152f544421ce49299eb1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/19c2cc01ff9a8031398a802676ffb0f4692dd95d",
          "url": "https://git.kernel.org/stable/c/19c2cc01ff9a8031398a802676ffb0f4692dd95d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1c1bcb0e78230f533b4103e8cf271d17c3f469f0",
          "url": "https://git.kernel.org/stable/c/1c1bcb0e78230f533b4103e8cf271d17c3f469f0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/223e2288f4b8c262a864e2c03964ffac91744cd5",
          "url": "https://git.kernel.org/stable/c/223e2288f4b8c262a864e2c03964ffac91744cd5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2d44723a091bc853272e1a51a488a3d22b80be5e",
          "url": "https://git.kernel.org/stable/c/2d44723a091bc853272e1a51a488a3d22b80be5e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/75705b44e0b9aaa74f4c163d93d388bcba9e386a",
          "url": "https://git.kernel.org/stable/c/75705b44e0b9aaa74f4c163d93d388bcba9e386a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/94d0c326cb3ee6b0f8bd00e209550b93fcc5c839",
          "url": "https://git.kernel.org/stable/c/94d0c326cb3ee6b0f8bd00e209550b93fcc5c839"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e9a673153d578fd439919a24e99851b2f87ecbce",
          "url": "https://git.kernel.org/stable/c/e9a673153d578fd439919a24e99851b2f87ecbce"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-25T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38699",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: bfa: Double-free fix\n\nWhen the bfad_im_probe() function fails during initialization, the memory\npointed to by bfad->im is freed without setting bfad->im to NULL.\n\nSubsequently, during driver uninstallation, when the state machine enters\nthe bfad_sm_stopping state and calls the bfad_im_probe_undo() function,\nit attempts to free the memory pointed to by bfad->im again, thereby\ntriggering a double-free vulnerability.\n\nSet bfad->im to NULL if probing fails.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38699"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/13f613228cf3c96a038424cd97aa4d6aadc66294",
          "url": "https://git.kernel.org/stable/c/13f613228cf3c96a038424cd97aa4d6aadc66294"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/39cfe2c83146aad956318f866d0ee471b7a61fa5",
          "url": "https://git.kernel.org/stable/c/39cfe2c83146aad956318f866d0ee471b7a61fa5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/50d9bd48321038bd6e15af5a454bbcd180cf6f80",
          "url": "https://git.kernel.org/stable/c/50d9bd48321038bd6e15af5a454bbcd180cf6f80"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/684c92bb08a25ed3c0356bc7eb532ed5b19588dd",
          "url": "https://git.kernel.org/stable/c/684c92bb08a25ed3c0356bc7eb532ed5b19588dd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8456f862cb95bcc3a831e1ba87c0c17068be0f3f",
          "url": "https://git.kernel.org/stable/c/8456f862cb95bcc3a831e1ba87c0c17068be0f3f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8e03dd9fadf76db5b9799583074a1a2a54f787f1",
          "url": "https://git.kernel.org/stable/c/8e03dd9fadf76db5b9799583074a1a2a54f787f1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9337c2affbaebe00b75fdf84ea0e2fcf93c140af",
          "url": "https://git.kernel.org/stable/c/9337c2affbaebe00b75fdf84ea0e2fcf93c140af"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/add4c4850363d7c1b72e8fce9ccb21fdd2cf5dc9",
          "url": "https://git.kernel.org/stable/c/add4c4850363d7c1b72e8fce9ccb21fdd2cf5dc9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ba024d92564580bb90ec367248ace8efe16ce815",
          "url": "https://git.kernel.org/stable/c/ba024d92564580bb90ec367248ace8efe16ce815"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53616",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: fix invalid free of JFS_IP(ipimap)->i_imap in diUnmount\n\nsyzbot found an invalid-free in diUnmount:\n\nBUG: KASAN: double-free in slab_free mm/slub.c:3661 [inline]\nBUG: KASAN: double-free in __kmem_cache_free+0x71/0x110 mm/slub.c:3674\nFree of addr ffff88806f410000 by task syz-executor131/3632\n\n CPU: 0 PID: 3632 Comm: syz-executor131 Not tainted 6.1.0-rc7-syzkaller-00012-gca57f02295f1 #0\n Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022\n Call Trace:\n  <TASK>\n  __dump_stack lib/dump_stack.c:88 [inline]\n  dump_stack_lvl+0x1b1/0x28e lib/dump_stack.c:106\n  print_address_description+0x74/0x340 mm/kasan/report.c:284\n  print_report+0x107/0x1f0 mm/kasan/report.c:395\n  kasan_report_invalid_free+0xac/0xd0 mm/kasan/report.c:460\n  ____kasan_slab_free+0xfb/0x120\n  kasan_slab_free include/linux/kasan.h:177 [inline]\n  slab_free_hook mm/slub.c:1724 [inline]\n  slab_free_freelist_hook+0x12e/0x1a0 mm/slub.c:1750\n  slab_free mm/slub.c:3661 [inline]\n  __kmem_cache_free+0x71/0x110 mm/slub.c:3674\n  diUnmount+0xef/0x100 fs/jfs/jfs_imap.c:195\n  jfs_umount+0x108/0x370 fs/jfs/jfs_umount.c:63\n  jfs_put_super+0x86/0x190 fs/jfs/super.c:194\n  generic_shutdown_super+0x130/0x310 fs/super.c:492\n  kill_block_super+0x79/0xd0 fs/super.c:1428\n  deactivate_locked_super+0xa7/0xf0 fs/super.c:332\n  cleanup_mnt+0x494/0x520 fs/namespace.c:1186\n  task_work_run+0x243/0x300 kernel/task_work.c:179\n  exit_task_work include/linux/task_work.h:38 [inline]\n  do_exit+0x664/0x2070 kernel/exit.c:820\n  do_group_exit+0x1fd/0x2b0 kernel/exit.c:950\n  __do_sys_exit_group kernel/exit.c:961 [inline]\n  __se_sys_exit_group kernel/exit.c:959 [inline]\n  __x64_sys_exit_group+0x3b/0x40 kernel/exit.c:959\n  do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n  do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80\n  entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[...]\n\nJFS_IP(ipimap)->i_imap is not setting to NULL after free in diUnmount.\nIf jfs_remount() free JFS_IP(ipimap)->i_imap but then failed at diMount().\nJFS_IP(ipimap)->i_imap will be freed once again.\nFix this problem by setting JFS_IP(ipimap)->i_imap to NULL after free.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53616"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/114ea3cb13ab25f7178cb60283adb93d2f96dad7",
          "url": "https://git.kernel.org/stable/c/114ea3cb13ab25f7178cb60283adb93d2f96dad7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4de3a603010e0ca334487de24c6aab0777b7f808",
          "url": "https://git.kernel.org/stable/c/4de3a603010e0ca334487de24c6aab0777b7f808"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5873df0195124be2f357de11bfd473ead4f90ed8",
          "url": "https://git.kernel.org/stable/c/5873df0195124be2f357de11bfd473ead4f90ed8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6e2bda2c192d0244b5a78b787ef20aa10cb319b7",
          "url": "https://git.kernel.org/stable/c/6e2bda2c192d0244b5a78b787ef20aa10cb319b7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/756747d4b439e3e1159282ae89f17eefebbe9b25",
          "url": "https://git.kernel.org/stable/c/756747d4b439e3e1159282ae89f17eefebbe9b25"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/88484bde6f12126616b38e43b6c00edcd941f615",
          "url": "https://git.kernel.org/stable/c/88484bde6f12126616b38e43b6c00edcd941f615"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c3c0f0ddd851b3fa3e9d3450bbcd561f4f850469",
          "url": "https://git.kernel.org/stable/c/c3c0f0ddd851b3fa3e9d3450bbcd561f4f850469"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ef7311101ca43dd73b45bca7a30ac72d9535ff87",
          "url": "https://git.kernel.org/stable/c/ef7311101ca43dd73b45bca7a30ac72d9535ff87"
        }
      ],
      "release_date": "2025-10-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39691",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/buffer: fix use-after-free when call bh_read() helper\n\nThere's issue as follows:\nBUG: KASAN: stack-out-of-bounds in end_buffer_read_sync+0xe3/0x110\nRead of size 8 at addr ffffc9000168f7f8 by task swapper/3/0\nCPU: 3 UID: 0 PID: 0 Comm: swapper/3 Not tainted 6.16.0-862.14.0.6.x86_64\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996)\nCall Trace:\n <IRQ>\n dump_stack_lvl+0x55/0x70\n print_address_description.constprop.0+0x2c/0x390\n print_report+0xb4/0x270\n kasan_report+0xb8/0xf0\n end_buffer_read_sync+0xe3/0x110\n end_bio_bh_io_sync+0x56/0x80\n blk_update_request+0x30a/0x720\n scsi_end_request+0x51/0x2b0\n scsi_io_completion+0xe3/0x480\n ? scsi_device_unbusy+0x11e/0x160\n blk_complete_reqs+0x7b/0x90\n handle_softirqs+0xef/0x370\n irq_exit_rcu+0xa5/0xd0\n sysvec_apic_timer_interrupt+0x6e/0x90\n </IRQ>\n\n Above issue happens when do ntfs3 filesystem mount, issue may happens\n as follows:\n           mount                            IRQ\nntfs_fill_super\n  read_cache_page\n    do_read_cache_folio\n      filemap_read_folio\n        mpage_read_folio\n\t do_mpage_readpage\n\t  ntfs_get_block_vbo\n\t   bh_read\n\t     submit_bh\n\t     wait_on_buffer(bh);\n\t                            blk_complete_reqs\n\t\t\t\t     scsi_io_completion\n\t\t\t\t      scsi_end_request\n\t\t\t\t       blk_update_request\n\t\t\t\t        end_bio_bh_io_sync\n\t\t\t\t\t end_buffer_read_sync\n\t\t\t\t\t  __end_buffer_read_notouch\n\t\t\t\t\t   unlock_buffer\n\n            wait_on_buffer(bh);--> return will return to caller\n\n\t\t\t\t\t  put_bh\n\t\t\t\t\t    --> trigger stack-out-of-bounds\nIn the mpage_read_folio() function, the stack variable 'map_bh' is\npassed to ntfs_get_block_vbo(). Once unlock_buffer() unlocks and\nwait_on_buffer() returns to continue processing, the stack variable\nis likely to be reclaimed. Consequently, during the end_buffer_read_sync()\nprocess, calling put_bh() may result in stack overrun.\n\nIf the bh is not allocated on the stack, it belongs to a folio.  Freeing\na buffer head which belongs to a folio is done by drop_buffers() which\nwill fail to free buffers which are still locked.  So it is safe to call\nput_bh() before __end_buffer_read_notouch().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39691"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/03b40bf5d0389ca23ae6857ee25789f0e0b47ce8",
          "url": "https://git.kernel.org/stable/c/03b40bf5d0389ca23ae6857ee25789f0e0b47ce8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/042cf48ecf67f72c8b3846c7fac678f472712ff3",
          "url": "https://git.kernel.org/stable/c/042cf48ecf67f72c8b3846c7fac678f472712ff3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3169edb8945c295cf89120fc6b2c35cfe3ad4c9e",
          "url": "https://git.kernel.org/stable/c/3169edb8945c295cf89120fc6b2c35cfe3ad4c9e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/70a09115da586bf662c3bae9c0c4a1b99251fad9",
          "url": "https://git.kernel.org/stable/c/70a09115da586bf662c3bae9c0c4a1b99251fad9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7375f22495e7cd1c5b3b5af9dcc4f6dffe34ce49",
          "url": "https://git.kernel.org/stable/c/7375f22495e7cd1c5b3b5af9dcc4f6dffe34ce49"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/90b5193edb323fefbee0e4e5bc39ed89dcc37719",
          "url": "https://git.kernel.org/stable/c/90b5193edb323fefbee0e4e5bc39ed89dcc37719"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c58c6b532b7b69537cfd9ef701c7e37cdcf79dc4",
          "url": "https://git.kernel.org/stable/c/c58c6b532b7b69537cfd9ef701c7e37cdcf79dc4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c5aa6ba1127307ab5dc3773eaf40d73a3423841f",
          "url": "https://git.kernel.org/stable/c/c5aa6ba1127307ab5dc3773eaf40d73a3423841f"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-05T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38428",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: ims-pcu - check record size in ims_pcu_flash_firmware()\n\nThe \"len\" variable comes from the firmware and we generally do\ntrust firmware, but it's always better to double check.  If the \"len\"\nis too large it could result in memory corruption when we do\n\"memcpy(fragment->data, rec->data, len);\"",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38428"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/17474a56acf708bf6b2d174c06ed26abad0a9fd6",
          "url": "https://git.kernel.org/stable/c/17474a56acf708bf6b2d174c06ed26abad0a9fd6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5a8cd6ae8393e2eaebf51d420d5374821ef2af87",
          "url": "https://git.kernel.org/stable/c/5a8cd6ae8393e2eaebf51d420d5374821ef2af87"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/74661516daee1eadebede8dc607b6830530096ec",
          "url": "https://git.kernel.org/stable/c/74661516daee1eadebede8dc607b6830530096ec"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8e03f1c7d50343bf21da54873301bc4fa647479f",
          "url": "https://git.kernel.org/stable/c/8e03f1c7d50343bf21da54873301bc4fa647479f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a95ef0199e80f3384eb992889322957d26c00102",
          "url": "https://git.kernel.org/stable/c/a95ef0199e80f3384eb992889322957d26c00102"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c1b9d140b0807c6aee4bb53e1bfa4e391e3dc204",
          "url": "https://git.kernel.org/stable/c/c1b9d140b0807c6aee4bb53e1bfa4e391e3dc204"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d63706d9f73846106fde28b284f08e01b92ce9f1",
          "url": "https://git.kernel.org/stable/c/d63706d9f73846106fde28b284f08e01b92ce9f1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e5a2481dc2a0b430f49276d7482793a8923631d6",
          "url": "https://git.kernel.org/stable/c/e5a2481dc2a0b430f49276d7482793a8923631d6"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-25T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53521",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ses: Fix slab-out-of-bounds in ses_intf_remove()\n\nA fix for:\n\nBUG: KASAN: slab-out-of-bounds in ses_intf_remove+0x23f/0x270 [ses]\nRead of size 8 at addr ffff88a10d32e5d8 by task rmmod/12013\n\nWhen edev->components is zero, accessing edev->component[0] members is\nwrong.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53521"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0595cdb587726b4f0fa780eb7462e3679d141e82",
          "url": "https://git.kernel.org/stable/c/0595cdb587726b4f0fa780eb7462e3679d141e82"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2fb1fa8425cce2dc4dce298275d22d7077694b73",
          "url": "https://git.kernel.org/stable/c/2fb1fa8425cce2dc4dce298275d22d7077694b73"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/40af9a6deed723485e05b7d3255a28750692e8db",
          "url": "https://git.kernel.org/stable/c/40af9a6deed723485e05b7d3255a28750692e8db"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/578797f0c8cbc2e3ec5fc0dab87087b4c7073686",
          "url": "https://git.kernel.org/stable/c/578797f0c8cbc2e3ec5fc0dab87087b4c7073686"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/76f7050537476ac062ec23a544fbca8270f2d08b",
          "url": "https://git.kernel.org/stable/c/76f7050537476ac062ec23a544fbca8270f2d08b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/82143faf01dda831b89eccef60c39ef8575ab08a",
          "url": "https://git.kernel.org/stable/c/82143faf01dda831b89eccef60c39ef8575ab08a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/87e47be38d205df338c52ead43f23b2864567423",
          "url": "https://git.kernel.org/stable/c/87e47be38d205df338c52ead43f23b2864567423"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8f9542cad6c27297c8391de3a659f0b7948495d0",
          "url": "https://git.kernel.org/stable/c/8f9542cad6c27297c8391de3a659f0b7948495d0"
        }
      ],
      "release_date": "2025-10-01T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38482",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: das6402: Fix bit shift out of bounds\n\nWhen checking for a supported IRQ number, the following test is used:\n\n\t/* IRQs 2,3,5,6,7, 10,11,15 are valid for \"enhanced\" mode */\n\tif ((1 << it->options[1]) & 0x8cec) {\n\nHowever, `it->options[i]` is an unchecked `int` value from userspace, so\nthe shift amount could be negative or out of bounds.  Fix the test by\nrequiring `it->options[1]` to be within bounds before proceeding with\nthe original test.  Valid `it->options[1]` values that select the IRQ\nwill be in the range [1,15]. The value 0 explicitly disables the use of\ninterrupts.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38482"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3eab654f5d199ecd45403c6588cda63e491fcfca",
          "url": "https://git.kernel.org/stable/c/3eab654f5d199ecd45403c6588cda63e491fcfca"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4a3c18cde02e35aba87e0ad5672b3e1c72dda5a4",
          "url": "https://git.kernel.org/stable/c/4a3c18cde02e35aba87e0ad5672b3e1c72dda5a4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/70f2b28b5243df557f51c054c20058ae207baaac",
          "url": "https://git.kernel.org/stable/c/70f2b28b5243df557f51c054c20058ae207baaac"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/73f34d609397805c20d6b2ef5c07a4cbf7c4d63a",
          "url": "https://git.kernel.org/stable/c/73f34d609397805c20d6b2ef5c07a4cbf7c4d63a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8a3637027ceeba4ca5e500b23cb7d24c25592513",
          "url": "https://git.kernel.org/stable/c/8a3637027ceeba4ca5e500b23cb7d24c25592513"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a15e9c175f783298c4ee48146be6841335400406",
          "url": "https://git.kernel.org/stable/c/a15e9c175f783298c4ee48146be6841335400406"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a18a42e77545afcacd6a2b8d9fc16191b87454df",
          "url": "https://git.kernel.org/stable/c/a18a42e77545afcacd6a2b8d9fc16191b87454df"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/de8da1063cce9234d55c8270d9bdf4cf84411c80",
          "url": "https://git.kernel.org/stable/c/de8da1063cce9234d55c8270d9bdf4cf84411c80"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-28T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53285",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: add bounds checking in get_max_inline_xattr_value_size()\n\nNormally the extended attributes in the inode body would have been\nchecked when the inode is first opened, but if someone is writing to\nthe block device while the file system is mounted, it's possible for\nthe inode table to get corrupted.  Add bounds checking to avoid\nreading beyond the end of allocated memory if this happens.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53285"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1d2caddbeeee56fbbc36b428c5b909c3ad88eb7f",
          "url": "https://git.kernel.org/stable/c/1d2caddbeeee56fbbc36b428c5b909c3ad88eb7f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2220eaf90992c11d888fe771055d4de330385f01",
          "url": "https://git.kernel.org/stable/c/2220eaf90992c11d888fe771055d4de330385f01"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3d7b8fbcd2273e2b9f4c6de5ce2f4c0cd3cb1205",
          "url": "https://git.kernel.org/stable/c/3d7b8fbcd2273e2b9f4c6de5ce2f4c0cd3cb1205"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4597554b4f7b29e7fd78aa449bab648f8da4ee2c",
          "url": "https://git.kernel.org/stable/c/4597554b4f7b29e7fd78aa449bab648f8da4ee2c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/486efbbc9445dca7890a1b86adbccb88b91284b0",
          "url": "https://git.kernel.org/stable/c/486efbbc9445dca7890a1b86adbccb88b91284b0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5a229d21b98d132673096710e8281ef522dab1d1",
          "url": "https://git.kernel.org/stable/c/5a229d21b98d132673096710e8281ef522dab1d1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/88a06a94942c5c0a896e9da1113a6bb29e36cbef",
          "url": "https://git.kernel.org/stable/c/88a06a94942c5c0a896e9da1113a6bb29e36cbef"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e780058bd75614b66882bc02620ddbd884171560",
          "url": "https://git.kernel.org/stable/c/e780058bd75614b66882bc02620ddbd884171560"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f22b274429e88d3dc7e79d375b56ce4f2f59f0b4",
          "url": "https://git.kernel.org/stable/c/f22b274429e88d3dc7e79d375b56ce4f2f59f0b4"
        }
      ],
      "release_date": "2025-09-16T08:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53484",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlib: cpu_rmap: Avoid use after free on rmap->obj array entries\n\nWhen calling irq_set_affinity_notifier() with NULL at the notify\nargument, it will cause freeing of the glue pointer in the\ncorresponding array entry but will leave the pointer in the array. A\nsubsequent call to free_irq_cpu_rmap() will try to free this entry again\nleading to possible use after free.\n\nFix that by setting NULL to the array entry and checking that we have\nnon-zero at the array entry when iterating over the array in\nfree_irq_cpu_rmap().\n\nThe current code does not suffer from this since there are no cases\nwhere irq_set_affinity_notifier(irq, NULL) (note the NULL passed for the\nnotify arg) is called, followed by a call to free_irq_cpu_rmap() so we\ndon't hit and issue. Subsequent patches in this series excersize this\nflow, hence the required fix.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53484"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4e0473f1060aa49621d40a113afde24818101d37",
          "url": "https://git.kernel.org/stable/c/4e0473f1060aa49621d40a113afde24818101d37"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/67bca5f1d644f4e79b694abd8052a177de81c37f",
          "url": "https://git.kernel.org/stable/c/67bca5f1d644f4e79b694abd8052a177de81c37f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/981f339d2905b6a92ef59358158b326493aecac5",
          "url": "https://git.kernel.org/stable/c/981f339d2905b6a92ef59358158b326493aecac5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c6ed54dd90698dc0744d669524cc1c122ded8a16",
          "url": "https://git.kernel.org/stable/c/c6ed54dd90698dc0744d669524cc1c122ded8a16"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c9115f49cf260d24d8b5f2d9a4b63cb31a627bb4",
          "url": "https://git.kernel.org/stable/c/c9115f49cf260d24d8b5f2d9a4b63cb31a627bb4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cc2d2b3dbfb0ba57bc027fb7e1121250c50e4000",
          "url": "https://git.kernel.org/stable/c/cc2d2b3dbfb0ba57bc027fb7e1121250c50e4000"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d1308bd0b24cb1d78fa2747d5fa3e055cc628a48",
          "url": "https://git.kernel.org/stable/c/d1308bd0b24cb1d78fa2747d5fa3e055cc628a48"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f748e15253833b771acbede14ea98f50831ac289",
          "url": "https://git.kernel.org/stable/c/f748e15253833b771acbede14ea98f50831ac289"
        }
      ],
      "release_date": "2025-10-01T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38245",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: Release atm_dev_mutex after removing procfs in atm_dev_deregister().\n\nsyzbot reported a warning below during atm_dev_register(). [0]\n\nBefore creating a new device and procfs/sysfs for it, atm_dev_register()\nlooks up a duplicated device by __atm_dev_lookup().  These operations are\ndone under atm_dev_mutex.\n\nHowever, when removing a device in atm_dev_deregister(), it releases the\nmutex just after removing the device from the list that __atm_dev_lookup()\niterates over.\n\nSo, there will be a small race window where the device does not exist on\nthe device list but procfs/sysfs are still not removed, triggering the\nsplat.\n\nLet's hold the mutex until procfs/sysfs are removed in\natm_dev_deregister().\n\n[0]:\nproc_dir_entry 'atm/atmtcp:0' already registered\nWARNING: CPU: 0 PID: 5919 at fs/proc/generic.c:377 proc_register+0x455/0x5f0 fs/proc/generic.c:377\nModules linked in:\nCPU: 0 UID: 0 PID: 5919 Comm: syz-executor284 Not tainted 6.16.0-rc2-syzkaller-00047-g52da431bf03b #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025\nRIP: 0010:proc_register+0x455/0x5f0 fs/proc/generic.c:377\nCode: 48 89 f9 48 c1 e9 03 80 3c 01 00 0f 85 a2 01 00 00 48 8b 44 24 10 48 c7 c7 20 c0 c2 8b 48 8b b0 d8 00 00 00 e8 0c 02 1c ff 90 <0f> 0b 90 90 48 c7 c7 80 f2 82 8e e8 0b de 23 09 48 8b 4c 24 28 48\nRSP: 0018:ffffc9000466fa30 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff817ae248\nRDX: ffff888026280000 RSI: ffffffff817ae255 RDI: 0000000000000001\nRBP: ffff8880232bed48 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000001 R12: ffff888076ed2140\nR13: dffffc0000000000 R14: ffff888078a61340 R15: ffffed100edda444\nFS:  00007f38b3b0c6c0(0000) GS:ffff888124753000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f38b3bdf953 CR3: 0000000076d58000 CR4: 00000000003526f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n proc_create_data+0xbe/0x110 fs/proc/generic.c:585\n atm_proc_dev_register+0x112/0x1e0 net/atm/proc.c:361\n atm_dev_register+0x46d/0x890 net/atm/resources.c:113\n atmtcp_create+0x77/0x210 drivers/atm/atmtcp.c:369\n atmtcp_attach drivers/atm/atmtcp.c:403 [inline]\n atmtcp_ioctl+0x2f9/0xd60 drivers/atm/atmtcp.c:464\n do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159\n sock_do_ioctl+0x115/0x280 net/socket.c:1190\n sock_ioctl+0x227/0x6b0 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:907 [inline]\n __se_sys_ioctl fs/ioctl.c:893 [inline]\n __x64_sys_ioctl+0x18b/0x210 fs/ioctl.c:893\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f38b3b74459\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f38b3b0c198 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 00007f38b3bfe318 RCX: 00007f38b3b74459\nRDX: 0000000000000000 RSI: 0000000000006180 RDI: 0000000000000005\nRBP: 00007f38b3bfe310 R08: 65732f636f72702f R09: 65732f636f72702f\nR10: 65732f636f72702f R11: 0000000000000246 R12: 00007f38b3bcb0ac\nR13: 00007f38b3b0c1a0 R14: 0000200000000200 R15: 00007f38b3bcb03b\n </TASK>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38245"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/26248d5d68c865b888d632162abbf8130645622c",
          "url": "https://git.kernel.org/stable/c/26248d5d68c865b888d632162abbf8130645622c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2a8dcee649d12f69713f2589171a1caf6d4fa439",
          "url": "https://git.kernel.org/stable/c/2a8dcee649d12f69713f2589171a1caf6d4fa439"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4bb1bb438134d9ee6b97cc07289dd7c569092eec",
          "url": "https://git.kernel.org/stable/c/4bb1bb438134d9ee6b97cc07289dd7c569092eec"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6922f1a048c090f10704bbef4a3a1e81932d2e0a",
          "url": "https://git.kernel.org/stable/c/6922f1a048c090f10704bbef4a3a1e81932d2e0a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a433791aeaea6e84df709e0b9584b9bbe040cd1c",
          "url": "https://git.kernel.org/stable/c/a433791aeaea6e84df709e0b9584b9bbe040cd1c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ae539d963a17443ec54cba8a767e4ffa318264f4",
          "url": "https://git.kernel.org/stable/c/ae539d963a17443ec54cba8a767e4ffa318264f4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b2e40fcfe1575faaa548f87614006d3fe44c779e",
          "url": "https://git.kernel.org/stable/c/b2e40fcfe1575faaa548f87614006d3fe44c779e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cabed6ba92a9a8c09da02a3f20e32ecd80989896",
          "url": "https://git.kernel.org/stable/c/cabed6ba92a9a8c09da02a3f20e32ecd80989896"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-09T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38680",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format()\n\nThe buffer length check before calling uvc_parse_format() only ensured\nthat the buffer has at least 3 bytes (buflen > 2), buf the function\naccesses buffer[3], requiring at least 4 bytes.\n\nThis can lead to an out-of-bounds read if the buffer has exactly 3 bytes.\n\nFix it by checking that the buffer has at least 4 bytes in\nuvc_parse_format().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38680"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1e269581b3aa5962fdc52757ab40da286168c087",
          "url": "https://git.kernel.org/stable/c/1e269581b3aa5962fdc52757ab40da286168c087"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/424980d33b3f816485513e538610168b03fab9f1",
          "url": "https://git.kernel.org/stable/c/424980d33b3f816485513e538610168b03fab9f1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6d4a7c0b296162354b6fc759a1475b9d57ddfaa6",
          "url": "https://git.kernel.org/stable/c/6d4a7c0b296162354b6fc759a1475b9d57ddfaa6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/782b6a718651eda3478b1824b37a8b3185d2740c",
          "url": "https://git.kernel.org/stable/c/782b6a718651eda3478b1824b37a8b3185d2740c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8343f3fe0b755925f83d60b05e92bf4396879758",
          "url": "https://git.kernel.org/stable/c/8343f3fe0b755925f83d60b05e92bf4396879758"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9ad554217c9b945031c73df4e8176a475e2dea57",
          "url": "https://git.kernel.org/stable/c/9ad554217c9b945031c73df4e8176a475e2dea57"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a97e062e4ff3dab84a2f1eb811e9eddc6699e2a9",
          "url": "https://git.kernel.org/stable/c/a97e062e4ff3dab84a2f1eb811e9eddc6699e2a9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cac702a439050df65272c49184aef7975fe3eff2",
          "url": "https://git.kernel.org/stable/c/cac702a439050df65272c49184aef7975fe3eff2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ffdd82182953df643aa63d999b6f1653d0c93778",
          "url": "https://git.kernel.org/stable/c/ffdd82182953df643aa63d999b6f1653d0c93778"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38530",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: pcl812: Fix bit shift out of bounds\n\nWhen checking for a supported IRQ number, the following test is used:\n\n\tif ((1 << it->options[1]) & board->irq_bits) {\n\nHowever, `it->options[i]` is an unchecked `int` value from userspace, so\nthe shift amount could be negative or out of bounds.  Fix the test by\nrequiring `it->options[1]` to be within bounds before proceeding with\nthe original test.  Valid `it->options[1]` values that select the IRQ\nwill be in the range [1,15]. The value 0 explicitly disables the use of\ninterrupts.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38530"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0489c30d080f07cc7f09d04de723d8c2ccdb61ef",
          "url": "https://git.kernel.org/stable/c/0489c30d080f07cc7f09d04de723d8c2ccdb61ef"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/16c173abee315953fd17a279352fec4a1faee862",
          "url": "https://git.kernel.org/stable/c/16c173abee315953fd17a279352fec4a1faee862"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/29ef03e5b84431171d6b77b822985b54bc44b793",
          "url": "https://git.kernel.org/stable/c/29ef03e5b84431171d6b77b822985b54bc44b793"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/374d9b3eb4b08407997ef1fce96119d31e0c0bc4",
          "url": "https://git.kernel.org/stable/c/374d9b3eb4b08407997ef1fce96119d31e0c0bc4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5bfa301e1e59a9b1a7b62a800b54852337c97416",
          "url": "https://git.kernel.org/stable/c/5bfa301e1e59a9b1a7b62a800b54852337c97416"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7e470d8efd10725b189ca8951973a8425932398a",
          "url": "https://git.kernel.org/stable/c/7e470d8efd10725b189ca8951973a8425932398a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a27e27eee313fe1c450b6af1e80e64412546cab4",
          "url": "https://git.kernel.org/stable/c/a27e27eee313fe1c450b6af1e80e64412546cab4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b14b076ce593f72585412fc7fd3747e03a5e3632",
          "url": "https://git.kernel.org/stable/c/b14b076ce593f72585412fc7fd3747e03a5e3632"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-08-16T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38715",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfs: fix slab-out-of-bounds in hfs_bnode_read()\n\nThis patch introduces is_bnode_offset_valid() method that checks\nthe requested offset value. Also, it introduces\ncheck_and_correct_requested_length() method that checks and\ncorrect the requested length (if it is necessary). These methods\nare used in hfs_bnode_read(), hfs_bnode_write(), hfs_bnode_clear(),\nhfs_bnode_copy(), and hfs_bnode_move() with the goal to prevent\nthe access out of allocated memory and triggering the crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38715"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/384a66b89f9540a9a8cb0f48807697dfabaece4c",
          "url": "https://git.kernel.org/stable/c/384a66b89f9540a9a8cb0f48807697dfabaece4c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/67ecc81f6492275c9c54280532f558483c99c90e",
          "url": "https://git.kernel.org/stable/c/67ecc81f6492275c9c54280532f558483c99c90e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a1a60e79502279f996e55052f50cc14919020475",
          "url": "https://git.kernel.org/stable/c/a1a60e79502279f996e55052f50cc14919020475"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a431930c9bac518bf99d6b1da526a7f37ddee8d8",
          "url": "https://git.kernel.org/stable/c/a431930c9bac518bf99d6b1da526a7f37ddee8d8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e7d2dc2421e821e4045775e6dc226378328de6f6",
          "url": "https://git.kernel.org/stable/c/e7d2dc2421e821e4045775e6dc226378328de6f6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/eec522fd0d28106b14a59ab2d658605febe4a3bb",
          "url": "https://git.kernel.org/stable/c/eec522fd0d28106b14a59ab2d658605febe4a3bb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/efc095b35b23297e419c2ab4fc1ed1a8f0781a29",
          "url": "https://git.kernel.org/stable/c/efc095b35b23297e419c2ab4fc1ed1a8f0781a29"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fc7f732984ec91f30be3e574e0644066d07f2b78",
          "url": "https://git.kernel.org/stable/c/fc7f732984ec91f30be3e574e0644066d07f2b78"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fe2891a9c43ab87d1a210d61e6438ca6936e2f62",
          "url": "https://git.kernel.org/stable/c/fe2891a9c43ab87d1a210d61e6438ca6936e2f62"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38483",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: das16m1: Fix bit shift out of bounds\n\nWhen checking for a supported IRQ number, the following test is used:\n\n\t/* only irqs 2, 3, 4, 5, 6, 7, 10, 11, 12, 14, and 15 are valid */\n\tif ((1 << it->options[1]) & 0xdcfc) {\n\nHowever, `it->options[i]` is an unchecked `int` value from userspace, so\nthe shift amount could be negative or out of bounds.  Fix the test by\nrequiring `it->options[1]` to be within bounds before proceeding with\nthe original test.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38483"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/076b13ee60eb01ed0d140ef261f95534562a3077",
          "url": "https://git.kernel.org/stable/c/076b13ee60eb01ed0d140ef261f95534562a3077"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/539bdff832adac9ea653859fa0b6bc62e743329c",
          "url": "https://git.kernel.org/stable/c/539bdff832adac9ea653859fa0b6bc62e743329c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/65c03e6fc524eb2868abedffd8a4613d78abc288",
          "url": "https://git.kernel.org/stable/c/65c03e6fc524eb2868abedffd8a4613d78abc288"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/adb7df8a8f9d788423e161b779764527dd3ec2d0",
          "url": "https://git.kernel.org/stable/c/adb7df8a8f9d788423e161b779764527dd3ec2d0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b3c95fa508e5dc3da60520eea92a5241095ceef1",
          "url": "https://git.kernel.org/stable/c/b3c95fa508e5dc3da60520eea92a5241095ceef1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d1291c69f46d6572b2cf75960dd8975d7ab2176b",
          "url": "https://git.kernel.org/stable/c/d1291c69f46d6572b2cf75960dd8975d7ab2176b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ed93c6f68a3be06e4e0c331c6e751f462dee3932",
          "url": "https://git.kernel.org/stable/c/ed93c6f68a3be06e4e0c331c6e751f462dee3932"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f211572818ed5bec2b3f5d4e0719ef8699b3c269",
          "url": "https://git.kernel.org/stable/c/f211572818ed5bec2b3f5d4e0719ef8699b3c269"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-28T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38204",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: fix array-index-out-of-bounds read in add_missing_indices\n\nstbl is s8 but it must contain offsets into slot which can go from 0 to\n127.\n\nAdded a bound check for that error and return -EIO if the check fails.\nAlso make jfs_readdir return with error if add_missing_indices returns\nwith an error.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38204"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/44618bee303bed151ef3a525ff79fbd7689593b5",
          "url": "https://git.kernel.org/stable/c/44618bee303bed151ef3a525ff79fbd7689593b5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5dff41a86377563f7a2b968aae00d25b4ceb37c9",
          "url": "https://git.kernel.org/stable/c/5dff41a86377563f7a2b968aae00d25b4ceb37c9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/81af4b34fd72d390d7f237c6a545cc6d09707956",
          "url": "https://git.kernel.org/stable/c/81af4b34fd72d390d7f237c6a545cc6d09707956"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bfa4655d28f338e68d345aed80d19be7999bbce2",
          "url": "https://git.kernel.org/stable/c/bfa4655d28f338e68d345aed80d19be7999bbce2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c8399564a58fb6ea2ff21a6fd278417943cb51a5",
          "url": "https://git.kernel.org/stable/c/c8399564a58fb6ea2ff21a6fd278417943cb51a5"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        }
      ],
      "release_date": "2025-07-04T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53153",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: Fix use after free for wext\n\nKey information in wext.connect is not reset on (re)connect and can hold\ndata from a previous connection.\n\nReset key data to avoid that drivers or mac80211 incorrectly detect a\nWEP connection request and access the freed or already reused memory.\n\nAdditionally optimize cfg80211_sme_connect() and avoid an useless\nschedule of conn_work.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53153"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/015b8cc5e7c4d7bb671f1984d7b7338c310b185b",
          "url": "https://git.kernel.org/stable/c/015b8cc5e7c4d7bb671f1984d7b7338c310b185b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/22dfb21bf1cd876616d45cda1bc6daa89eec6747",
          "url": "https://git.kernel.org/stable/c/22dfb21bf1cd876616d45cda1bc6daa89eec6747"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2cfe78619b0de6d2da773978bc2d22797212eaa7",
          "url": "https://git.kernel.org/stable/c/2cfe78619b0de6d2da773978bc2d22797212eaa7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/66af4a2ab1d65d556d638cb9555a3b823c2557a9",
          "url": "https://git.kernel.org/stable/c/66af4a2ab1d65d556d638cb9555a3b823c2557a9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6f1959c17d4cb5b74af6fc31dc787e1dc3e4f6e2",
          "url": "https://git.kernel.org/stable/c/6f1959c17d4cb5b74af6fc31dc787e1dc3e4f6e2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a2a92b3e9d8e03ee3f9ee407fc46a9b4bd02d8b6",
          "url": "https://git.kernel.org/stable/c/a2a92b3e9d8e03ee3f9ee407fc46a9b4bd02d8b6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f4b6a138efb8a32507b8946104e32cb926308da7",
          "url": "https://git.kernel.org/stable/c/f4b6a138efb8a32507b8946104e32cb926308da7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fd081afd21eb35b968b0330700c43ec94986e1c4",
          "url": "https://git.kernel.org/stable/c/fd081afd21eb35b968b0330700c43ec94986e1c4"
        }
      ],
      "release_date": "2025-09-15T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53587",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nring-buffer: Sync IRQ works before buffer destruction\n\nIf something was written to the buffer just before destruction,\nit may be possible (maybe not in a real system, but it did\nhappen in ARCH=um with time-travel) to destroy the ringbuffer\nbefore the IRQ work ran, leading this KASAN report (or a crash\nwithout KASAN):\n\n    BUG: KASAN: slab-use-after-free in irq_work_run_list+0x11a/0x13a\n    Read of size 8 at addr 000000006d640a48 by task swapper/0\n\n    CPU: 0 PID: 0 Comm: swapper Tainted: G        W  O       6.3.0-rc1 #7\n    Stack:\n     60c4f20f 0c203d48 41b58ab3 60f224fc\n     600477fa 60f35687 60c4f20f 601273dd\n     00000008 6101eb00 6101eab0 615be548\n    Call Trace:\n     [<60047a58>] show_stack+0x25e/0x282\n     [<60c609e0>] dump_stack_lvl+0x96/0xfd\n     [<60c50d4c>] print_report+0x1a7/0x5a8\n     [<603078d3>] kasan_report+0xc1/0xe9\n     [<60308950>] __asan_report_load8_noabort+0x1b/0x1d\n     [<60232844>] irq_work_run_list+0x11a/0x13a\n     [<602328b4>] irq_work_tick+0x24/0x34\n     [<6017f9dc>] update_process_times+0x162/0x196\n     [<6019f335>] tick_sched_handle+0x1a4/0x1c3\n     [<6019fd9e>] tick_sched_timer+0x79/0x10c\n     [<601812b9>] __hrtimer_run_queues.constprop.0+0x425/0x695\n     [<60182913>] hrtimer_interrupt+0x16c/0x2c4\n     [<600486a3>] um_timer+0x164/0x183\n     [...]\n\n    Allocated by task 411:\n     save_stack_trace+0x99/0xb5\n     stack_trace_save+0x81/0x9b\n     kasan_save_stack+0x2d/0x54\n     kasan_set_track+0x34/0x3e\n     kasan_save_alloc_info+0x25/0x28\n     ____kasan_kmalloc+0x8b/0x97\n     __kasan_kmalloc+0x10/0x12\n     __kmalloc+0xb2/0xe8\n     load_elf_phdrs+0xee/0x182\n     [...]\n\n    The buggy address belongs to the object at 000000006d640800\n     which belongs to the cache kmalloc-1k of size 1024\n    The buggy address is located 584 bytes inside of\n     freed 1024-byte region [000000006d640800, 000000006d640c00)\n\nAdd the appropriate irq_work_sync() so the work finishes before\nthe buffers are destroyed.\n\nPrior to the commit in the Fixes tag below, there was only a\nsingle global IRQ work, so this issue didn't exist.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53587"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0a65165bd24ee9231191597b7c232376fcd70cdb",
          "url": "https://git.kernel.org/stable/c/0a65165bd24ee9231191597b7c232376fcd70cdb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1c99f65d6af2a454bfd5207b4f6a97c8474a1191",
          "url": "https://git.kernel.org/stable/c/1c99f65d6af2a454bfd5207b4f6a97c8474a1191"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2399b1fda025e939b6fb1ac94505bcf718534e65",
          "url": "https://git.kernel.org/stable/c/2399b1fda025e939b6fb1ac94505bcf718534e65"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2702b67f59d455072a08dc40312f9b090d4dec04",
          "url": "https://git.kernel.org/stable/c/2702b67f59d455072a08dc40312f9b090d4dec04"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/372c5ee537b8366b64b691ba29e9335525e1655e",
          "url": "https://git.kernel.org/stable/c/372c5ee537b8366b64b691ba29e9335525e1655e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/675751bb20634f981498c7d66161584080cc061e",
          "url": "https://git.kernel.org/stable/c/675751bb20634f981498c7d66161584080cc061e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c63741e872fcfb10e153517750f7908f0c00f60d",
          "url": "https://git.kernel.org/stable/c/c63741e872fcfb10e153517750f7908f0c00f60d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d9834abd8b24d1fe8092859e436fe1e0fd467c61",
          "url": "https://git.kernel.org/stable/c/d9834abd8b24d1fe8092859e436fe1e0fd467c61"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fc6858b7f8e1221f62ce8c6ff8a13a349c32cd76",
          "url": "https://git.kernel.org/stable/c/fc6858b7f8e1221f62ce8c6ff8a13a349c32cd76"
        }
      ],
      "release_date": "2025-10-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53311",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix use-after-free of nilfs_root in dirtying inodes via iput\n\nDuring unmount process of nilfs2, nothing holds nilfs_root structure after\nnilfs2 detaches its writer in nilfs_detach_log_writer().  Previously,\nnilfs_evict_inode() could cause use-after-free read for nilfs_root if\ninodes are left in \"garbage_list\" and released by nilfs_dispose_list at\nthe end of nilfs_detach_log_writer(), and this bug was fixed by commit\n9b5a04ac3ad9 (\"nilfs2: fix use-after-free bug of nilfs_root in\nnilfs_evict_inode()\").\n\nHowever, it turned out that there is another possibility of UAF in the\ncall path where mark_inode_dirty_sync() is called from iput():\n\nnilfs_detach_log_writer()\n  nilfs_dispose_list()\n    iput()\n      mark_inode_dirty_sync()\n        __mark_inode_dirty()\n          nilfs_dirty_inode()\n            __nilfs_mark_inode_dirty()\n              nilfs_load_inode_block() --> causes UAF of nilfs_root struct\n\nThis can happen after commit 0ae45f63d4ef (\"vfs: add support for a\nlazytime mount option\"), which changed iput() to call\nmark_inode_dirty_sync() on its final reference if i_state has I_DIRTY_TIME\nflag and i_nlink is non-zero.\n\nThis issue appears after commit 28a65b49eb53 (\"nilfs2: do not write dirty\ndata after degenerating to read-only\") when using the syzbot reproducer,\nbut the issue has potentially existed before.\n\nFix this issue by adding a \"purging flag\" to the nilfs structure, setting\nthat flag while disposing the \"garbage_list\" and checking it in\n__nilfs_mark_inode_dirty().\n\nUnlike commit 9b5a04ac3ad9 (\"nilfs2: fix use-after-free bug of nilfs_root\nin nilfs_evict_inode()\"), this patch does not rely on ns_writer to\ndetermine whether to skip operations, so as not to break recovery on\nmount.  The nilfs_salvage_orphan_logs routine dirties the buffer of\nsalvaged data before attaching the log writer, so changing\n__nilfs_mark_inode_dirty() to skip the operation when ns_writer is NULL\nwill cause recovery write to fail.  The purpose of using the cleanup-only\nflag is to allow for narrowing of such conditions.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53311"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/11afd67f1b3c28eb216e50a3ca8dbcb69bb71793",
          "url": "https://git.kernel.org/stable/c/11afd67f1b3c28eb216e50a3ca8dbcb69bb71793"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3645510cf926e6af2f4d44899370d7e5331c93bd",
          "url": "https://git.kernel.org/stable/c/3645510cf926e6af2f4d44899370d7e5331c93bd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/37207240872456fbab44a110bde6640445233963",
          "url": "https://git.kernel.org/stable/c/37207240872456fbab44a110bde6640445233963"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5828d5f5dc877dcfdd7b23102e978e2ecfd86d82",
          "url": "https://git.kernel.org/stable/c/5828d5f5dc877dcfdd7b23102e978e2ecfd86d82"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7532ff6edbf5242376b24a95a2fefb59bb653e5a",
          "url": "https://git.kernel.org/stable/c/7532ff6edbf5242376b24a95a2fefb59bb653e5a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a3c3b4cbf9b8554120fb230e6516e980c6277487",
          "url": "https://git.kernel.org/stable/c/a3c3b4cbf9b8554120fb230e6516e980c6277487"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d2c539c216cce74837a9cf5804eb205939b82227",
          "url": "https://git.kernel.org/stable/c/d2c539c216cce74837a9cf5804eb205939b82227"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f8654743a0e6909dc634cbfad6db6816f10f3399",
          "url": "https://git.kernel.org/stable/c/f8654743a0e6909dc634cbfad6db6816f10f3399"
        }
      ],
      "release_date": "2025-09-16T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53675",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ses: Fix possible desc_ptr out-of-bounds accesses\n\nSanitize possible desc_ptr out-of-bounds accesses in\nses_enclosure_data_process().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53675"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/414418abc19fa4ccf730d273061a426c07a061d6",
          "url": "https://git.kernel.org/stable/c/414418abc19fa4ccf730d273061a426c07a061d6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4b8cae410472653a59e15af62c57c49b8e0a1201",
          "url": "https://git.kernel.org/stable/c/4b8cae410472653a59e15af62c57c49b8e0a1201"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/584892fd29a41ef424a148118a3103b16b94fb8c",
          "url": "https://git.kernel.org/stable/c/584892fd29a41ef424a148118a3103b16b94fb8c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/72021ae61a2bc6ca73cd593e255a10ed5f5dc5e7",
          "url": "https://git.kernel.org/stable/c/72021ae61a2bc6ca73cd593e255a10ed5f5dc5e7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/79ec5dd5fb07ecaea2f978c2d7a9f2f3526e4d19",
          "url": "https://git.kernel.org/stable/c/79ec5dd5fb07ecaea2f978c2d7a9f2f3526e4d19"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/801ab13d50cf3d26170ee073ea8bb4eececb76ab",
          "url": "https://git.kernel.org/stable/c/801ab13d50cf3d26170ee073ea8bb4eececb76ab"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c315560e3ef77c1d822249f1743e647dc9c9912a",
          "url": "https://git.kernel.org/stable/c/c315560e3ef77c1d822249f1743e647dc9c9912a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cffe09ca0555e235a42d6fa065e463c4b3d5b657",
          "url": "https://git.kernel.org/stable/c/cffe09ca0555e235a42d6fa065e463c4b3d5b657"
        }
      ],
      "release_date": "2025-10-07T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53676",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show()\n\nThe function lio_target_nacl_info_show() uses sprintf() in a loop to print\ndetails for every iSCSI connection in a session without checking for the\nbuffer length. With enough iSCSI connections it's possible to overflow the\nbuffer provided by configfs and corrupt the memory.\n\nThis patch replaces sprintf() with sysfs_emit_at() that checks for buffer\nboundries.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53676"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0cac6cbb9908309352a5d30c1876882771d3da50",
          "url": "https://git.kernel.org/stable/c/0cac6cbb9908309352a5d30c1876882771d3da50"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/114b44dddea1f8f99576de3c0e6e9059012002fc",
          "url": "https://git.kernel.org/stable/c/114b44dddea1f8f99576de3c0e6e9059012002fc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2cbe6a88fbdd6e8aeab358eef61472e2de43d6f6",
          "url": "https://git.kernel.org/stable/c/2cbe6a88fbdd6e8aeab358eef61472e2de43d6f6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4738bf8b2d3635c2944b81b2a84d97b8c8b0978d",
          "url": "https://git.kernel.org/stable/c/4738bf8b2d3635c2944b81b2a84d97b8c8b0978d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5353df78c22623b42a71d51226d228a8413097e2",
          "url": "https://git.kernel.org/stable/c/5353df78c22623b42a71d51226d228a8413097e2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/801f287c93ff95582b0a2d2163f12870a2f076d4",
          "url": "https://git.kernel.org/stable/c/801f287c93ff95582b0a2d2163f12870a2f076d4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bbe3ff47bf09db8956bc2eeb49d2d514d256ad2a",
          "url": "https://git.kernel.org/stable/c/bbe3ff47bf09db8956bc2eeb49d2d514d256ad2a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/df349e84c2cb0dd05d98c8e1189c26ab4b116083",
          "url": "https://git.kernel.org/stable/c/df349e84c2cb0dd05d98c8e1189c26ab4b116083"
        }
      ],
      "release_date": "2025-10-07T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38198",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbcon: Make sure modelist not set on unregistered console\n\nIt looks like attempting to write to the \"store_modes\" sysfs node will\nrun afoul of unregistered consoles:\n\nUBSAN: array-index-out-of-bounds in drivers/video/fbdev/core/fbcon.c:122:28\nindex -1 is out of range for type 'fb_info *[32]'\n...\n fbcon_info_from_console+0x192/0x1a0 drivers/video/fbdev/core/fbcon.c:122\n fbcon_new_modelist+0xbf/0x2d0 drivers/video/fbdev/core/fbcon.c:3048\n fb_new_modelist+0x328/0x440 drivers/video/fbdev/core/fbmem.c:673\n store_modes+0x1c9/0x3e0 drivers/video/fbdev/core/fbsysfs.c:113\n dev_attr_store+0x55/0x80 drivers/base/core.c:2439\n\nstatic struct fb_info *fbcon_registered_fb[FB_MAX];\n...\nstatic signed char con2fb_map[MAX_NR_CONSOLES];\n...\nstatic struct fb_info *fbcon_info_from_console(int console)\n...\n        return fbcon_registered_fb[con2fb_map[console]];\n\nIf con2fb_map contains a -1 things go wrong here. Instead, return NULL,\nas callers of fbcon_info_from_console() are trying to compare against\nexisting \"info\" pointers, so error handling should kick in correctly.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38198"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/519ba75728ee8cd561dce25fc52a2ec5c47171dc",
          "url": "https://git.kernel.org/stable/c/519ba75728ee8cd561dce25fc52a2ec5c47171dc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/54b28f7c567dd659e5f9562f518e4d7f3f6a367b",
          "url": "https://git.kernel.org/stable/c/54b28f7c567dd659e5f9562f518e4d7f3f6a367b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b3237d451bf3a4490cb1a76f3b7c91d9888f1c4b",
          "url": "https://git.kernel.org/stable/c/b3237d451bf3a4490cb1a76f3b7c91d9888f1c4b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cedc1b63394a866bf8663a3e40f4546f1d28c8d8",
          "url": "https://git.kernel.org/stable/c/cedc1b63394a866bf8663a3e40f4546f1d28c8d8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f28f1f578cd810779d01999c60618cda14c281dd",
          "url": "https://git.kernel.org/stable/c/f28f1f578cd810779d01999c60618cda14c281dd"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-04T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53265",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nubi: ensure that VID header offset + VID header size <= alloc, size\n\nEnsure that the VID header offset + VID header size does not exceed\nthe allocated area to avoid slab OOB.\n\nBUG: KASAN: slab-out-of-bounds in crc32_body lib/crc32.c:111 [inline]\nBUG: KASAN: slab-out-of-bounds in crc32_le_generic lib/crc32.c:179 [inline]\nBUG: KASAN: slab-out-of-bounds in crc32_le_base+0x58c/0x626 lib/crc32.c:197\nRead of size 4 at addr ffff88802bb36f00 by task syz-executor136/1555\n\nCPU: 2 PID: 1555 Comm: syz-executor136 Tainted: G        W\n6.0.0-1868 #1\nHardware name: Red Hat KVM, BIOS 1.13.0-2.module+el8.3.0+7860+a7792d29\n04/01/2014\nCall Trace:\n  <TASK>\n  __dump_stack lib/dump_stack.c:88 [inline]\n  dump_stack_lvl+0x85/0xad lib/dump_stack.c:106\n  print_address_description mm/kasan/report.c:317 [inline]\n  print_report.cold.13+0xb6/0x6bb mm/kasan/report.c:433\n  kasan_report+0xa7/0x11b mm/kasan/report.c:495\n  crc32_body lib/crc32.c:111 [inline]\n  crc32_le_generic lib/crc32.c:179 [inline]\n  crc32_le_base+0x58c/0x626 lib/crc32.c:197\n  ubi_io_write_vid_hdr+0x1b7/0x472 drivers/mtd/ubi/io.c:1067\n  create_vtbl+0x4d5/0x9c4 drivers/mtd/ubi/vtbl.c:317\n  create_empty_lvol drivers/mtd/ubi/vtbl.c:500 [inline]\n  ubi_read_volume_table+0x67b/0x288a drivers/mtd/ubi/vtbl.c:812\n  ubi_attach+0xf34/0x1603 drivers/mtd/ubi/attach.c:1601\n  ubi_attach_mtd_dev+0x6f3/0x185e drivers/mtd/ubi/build.c:965\n  ctrl_cdev_ioctl+0x2db/0x347 drivers/mtd/ubi/cdev.c:1043\n  vfs_ioctl fs/ioctl.c:51 [inline]\n  __do_sys_ioctl fs/ioctl.c:870 [inline]\n  __se_sys_ioctl fs/ioctl.c:856 [inline]\n  __x64_sys_ioctl+0x193/0x213 fs/ioctl.c:856\n  do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n  do_syscall_64+0x3e/0x86 arch/x86/entry/common.c:80\n  entry_SYSCALL_64_after_hwframe+0x63/0x0\nRIP: 0033:0x7f96d5cf753d\nCode:\nRSP: 002b:00007fffd72206f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f96d5cf753d\nRDX: 0000000020000080 RSI: 0000000040186f40 RDI: 0000000000000003\nRBP: 0000000000400cd0 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000400be0\nR13: 00007fffd72207e0 R14: 0000000000000000 R15: 0000000000000000\n  </TASK>\n\nAllocated by task 1555:\n  kasan_save_stack+0x20/0x3d mm/kasan/common.c:38\n  kasan_set_track mm/kasan/common.c:45 [inline]\n  set_alloc_info mm/kasan/common.c:437 [inline]\n  ____kasan_kmalloc mm/kasan/common.c:516 [inline]\n  __kasan_kmalloc+0x88/0xa3 mm/kasan/common.c:525\n  kasan_kmalloc include/linux/kasan.h:234 [inline]\n  __kmalloc+0x138/0x257 mm/slub.c:4429\n  kmalloc include/linux/slab.h:605 [inline]\n  ubi_alloc_vid_buf drivers/mtd/ubi/ubi.h:1093 [inline]\n  create_vtbl+0xcc/0x9c4 drivers/mtd/ubi/vtbl.c:295\n  create_empty_lvol drivers/mtd/ubi/vtbl.c:500 [inline]\n  ubi_read_volume_table+0x67b/0x288a drivers/mtd/ubi/vtbl.c:812\n  ubi_attach+0xf34/0x1603 drivers/mtd/ubi/attach.c:1601\n  ubi_attach_mtd_dev+0x6f3/0x185e drivers/mtd/ubi/build.c:965\n  ctrl_cdev_ioctl+0x2db/0x347 drivers/mtd/ubi/cdev.c:1043\n  vfs_ioctl fs/ioctl.c:51 [inline]\n  __do_sys_ioctl fs/ioctl.c:870 [inline]\n  __se_sys_ioctl fs/ioctl.c:856 [inline]\n  __x64_sys_ioctl+0x193/0x213 fs/ioctl.c:856\n  do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n  do_syscall_64+0x3e/0x86 arch/x86/entry/common.c:80\n  entry_SYSCALL_64_after_hwframe+0x63/0x0\n\nThe buggy address belongs to the object at ffff88802bb36e00\n  which belongs to the cache kmalloc-256 of size 256\nThe buggy address is located 0 bytes to the right of\n  256-byte region [ffff88802bb36e00, ffff88802bb36f00)\n\nThe buggy address belongs to the physical page:\npage:00000000ea4d1263 refcount:1 mapcount:0 mapping:0000000000000000\nindex:0x0 pfn:0x2bb36\nhead:00000000ea4d1263 order:1 compound_mapcount:0 compound_pincount:0\nflags: 0xfffffc0010200(slab|head|node=0|zone=1|lastcpupid=0x1fffff)\nraw: 000fffffc0010200 ffffea000066c300 dead000000000003 ffff888100042b40\nraw: 0000000000000000 00000000001\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53265"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1b42b1a36fc946f0d7088425b90d491b4257ca3e",
          "url": "https://git.kernel.org/stable/c/1b42b1a36fc946f0d7088425b90d491b4257ca3e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/61aeba0e4b4124cfe3c5427feaf29c626dfa89e5",
          "url": "https://git.kernel.org/stable/c/61aeba0e4b4124cfe3c5427feaf29c626dfa89e5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/61e04db3bec87f7dd10074296deb7d083e2ccade",
          "url": "https://git.kernel.org/stable/c/61e04db3bec87f7dd10074296deb7d083e2ccade"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/701bb3ed5a88a73ebbe1266895bdeff065226dca",
          "url": "https://git.kernel.org/stable/c/701bb3ed5a88a73ebbe1266895bdeff065226dca"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/771e207a839a29ba943e89f473b0fecd16089e2e",
          "url": "https://git.kernel.org/stable/c/771e207a839a29ba943e89f473b0fecd16089e2e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/846bfba34175c23b13cc2023c2d67b96e8c14c43",
          "url": "https://git.kernel.org/stable/c/846bfba34175c23b13cc2023c2d67b96e8c14c43"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e1b73fe4f4c6bb80755eb4bf4b867a8fd8b1a7fe",
          "url": "https://git.kernel.org/stable/c/e1b73fe4f4c6bb80755eb4bf4b867a8fd8b1a7fe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f7adb740f97b6fa84e658892dcb08e37a31a4e77",
          "url": "https://git.kernel.org/stable/c/f7adb740f97b6fa84e658892dcb08e37a31a4e77"
        }
      ],
      "release_date": "2025-09-16T08:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53668",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nring-buffer: Fix deadloop issue on reading trace_pipe\n\nSoft lockup occurs when reading file 'trace_pipe':\n\n  watchdog: BUG: soft lockup - CPU#6 stuck for 22s! [cat:4488]\n  [...]\n  RIP: 0010:ring_buffer_empty_cpu+0xed/0x170\n  RSP: 0018:ffff88810dd6fc48 EFLAGS: 00000246\n  RAX: 0000000000000000 RBX: 0000000000000246 RCX: ffffffff93d1aaeb\n  RDX: ffff88810a280040 RSI: 0000000000000008 RDI: ffff88811164b218\n  RBP: ffff88811164b218 R08: 0000000000000000 R09: ffff88815156600f\n  R10: ffffed102a2acc01 R11: 0000000000000001 R12: 0000000051651901\n  R13: 0000000000000000 R14: ffff888115e49500 R15: 0000000000000000\n  [...]\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 00007f8d853c2000 CR3: 000000010dcd8000 CR4: 00000000000006e0\n  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n  Call Trace:\n   __find_next_entry+0x1a8/0x4b0\n   ? peek_next_entry+0x250/0x250\n   ? down_write+0xa5/0x120\n   ? down_write_killable+0x130/0x130\n   trace_find_next_entry_inc+0x3b/0x1d0\n   tracing_read_pipe+0x423/0xae0\n   ? tracing_splice_read_pipe+0xcb0/0xcb0\n   vfs_read+0x16b/0x490\n   ksys_read+0x105/0x210\n   ? __ia32_sys_pwrite64+0x200/0x200\n   ? switch_fpu_return+0x108/0x220\n   do_syscall_64+0x33/0x40\n   entry_SYSCALL_64_after_hwframe+0x61/0xc6\n\nThrough the vmcore, I found it's because in tracing_read_pipe(),\nring_buffer_empty_cpu() found some buffer is not empty but then it\ncannot read anything due to \"rb_num_of_entries() == 0\" always true,\nThen it infinitely loop the procedure due to user buffer not been\nfilled, see following code path:\n\n  tracing_read_pipe() {\n    ... ...\n    waitagain:\n      tracing_wait_pipe() // 1. find non-empty buffer here\n      trace_find_next_entry_inc()  // 2. loop here try to find an entry\n        __find_next_entry()\n          ring_buffer_empty_cpu();  // 3. find non-empty buffer\n          peek_next_entry()  // 4. but peek always return NULL\n            ring_buffer_peek()\n              rb_buffer_peek()\n                rb_get_reader_page()\n                  // 5. because rb_num_of_entries() == 0 always true here\n                  //    then return NULL\n      // 6. user buffer not been filled so goto 'waitgain'\n      //    and eventually leads to an deadloop in kernel!!!\n  }\n\nBy some analyzing, I found that when resetting ringbuffer, the 'entries'\nof its pages are not all cleared (see rb_reset_cpu()). Then when reducing\nthe ringbuffer, and if some reduced pages exist dirty 'entries' data, they\nwill be added into 'cpu_buffer->overrun' (see rb_remove_pages()), which\ncause wrong 'overrun' count and eventually cause the deadloop issue.\n\nTo fix it, we need to clear every pages in rb_reset_cpu().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53668"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0a29dae5786d263016a9aceb1e56bf3fd4cc6fa0",
          "url": "https://git.kernel.org/stable/c/0a29dae5786d263016a9aceb1e56bf3fd4cc6fa0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/27bdd93e44cc28dd9b94893fae146b83d4f5b31e",
          "url": "https://git.kernel.org/stable/c/27bdd93e44cc28dd9b94893fae146b83d4f5b31e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5e68f1f3a20fe9b6bde018e353269fbfa289609c",
          "url": "https://git.kernel.org/stable/c/5e68f1f3a20fe9b6bde018e353269fbfa289609c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7e42907f3a7b4ce3a2d1757f6d78336984daf8f5",
          "url": "https://git.kernel.org/stable/c/7e42907f3a7b4ce3a2d1757f6d78336984daf8f5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8b0b63fdac6b70a45614e7d4b30e5bbb93deb007",
          "url": "https://git.kernel.org/stable/c/8b0b63fdac6b70a45614e7d4b30e5bbb93deb007"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a55e8a3596048c2f7b574049aeb1885b5abba1cc",
          "url": "https://git.kernel.org/stable/c/a55e8a3596048c2f7b574049aeb1885b5abba1cc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bb14a93bccc92766b1d9302c6bcbea17d4bce306",
          "url": "https://git.kernel.org/stable/c/bb14a93bccc92766b1d9302c6bcbea17d4bce306"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e84829522fc72bb43556b31575731de0440ac0dd",
          "url": "https://git.kernel.org/stable/c/e84829522fc72bb43556b31575731de0440ac0dd"
        }
      ],
      "release_date": "2025-10-07T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53259",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nVMCI: check context->notify_page after call to get_user_pages_fast() to avoid GPF\n\nThe call to get_user_pages_fast() in vmci_host_setup_notify() can return\nNULL context->notify_page causing a GPF. To avoid GPF check if\ncontext->notify_page == NULL and return error if so.\n\ngeneral protection fault, probably for non-canonical address\n    0xe0009d1000000060: 0000 [#1] PREEMPT SMP KASAN NOPTI\nKASAN: maybe wild-memory-access in range [0x0005088000000300-\n    0x0005088000000307]\nCPU: 2 PID: 26180 Comm: repro_34802241 Not tainted 6.1.0-rc4 #1\nHardware name: Red Hat KVM, BIOS 1.15.0-2.module+el8.6.0 04/01/2014\nRIP: 0010:vmci_ctx_check_signal_notify+0x91/0xe0\nCall Trace:\n <TASK>\n vmci_host_unlocked_ioctl+0x362/0x1f40\n __x64_sys_ioctl+0x1a1/0x230\n do_syscall_64+0x3a/0x90\n entry_SYSCALL_64_after_hwframe+0x63/0xcd",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53259"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/055891397f530f9b1b22be38d7eca8b08382941f",
          "url": "https://git.kernel.org/stable/c/055891397f530f9b1b22be38d7eca8b08382941f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1a726cb47fd204109c767409fa9ca15a96328f14",
          "url": "https://git.kernel.org/stable/c/1a726cb47fd204109c767409fa9ca15a96328f14"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/91b8e4f61f8f4594ee65368c8d89e6fdc29d3fb1",
          "url": "https://git.kernel.org/stable/c/91b8e4f61f8f4594ee65368c8d89e6fdc29d3fb1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a3c89e8c69a58f62451c0a75b77fcab25979b897",
          "url": "https://git.kernel.org/stable/c/a3c89e8c69a58f62451c0a75b77fcab25979b897"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b4239bfb260d1e6837766c41a0b241d7670f1402",
          "url": "https://git.kernel.org/stable/c/b4239bfb260d1e6837766c41a0b241d7670f1402"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d4198f67e7556b1507f14f60d81a72660e5560e4",
          "url": "https://git.kernel.org/stable/c/d4198f67e7556b1507f14f60d81a72660e5560e4"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        }
      ],
      "release_date": "2025-09-15T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38685",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: Fix vmalloc out-of-bounds write in fast_imageblit\n\nThis issue triggers when a userspace program does an ioctl\nFBIOPUT_CON2FBMAP by passing console number and frame buffer number.\nIdeally this maps console to frame buffer and updates the screen if\nconsole is visible.\n\nAs part of mapping it has to do resize of console according to frame\nbuffer info. if this resize fails and returns from vc_do_resize() and\ncontinues further. At this point console and new frame buffer are mapped\nand sets display vars. Despite failure still it continue to proceed\nupdating the screen at later stages where vc_data is related to previous\nframe buffer and frame buffer info and display vars are mapped to new\nframe buffer and eventully leading to out-of-bounds write in\nfast_imageblit(). This bheviour is excepted only when fg_console is\nequal to requested console which is a visible console and updates screen\nwith invalid struct references in fbcon_putcs().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38685"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/078e62bffca4b7e72e8f3550eb063ab981c36c7a",
          "url": "https://git.kernel.org/stable/c/078e62bffca4b7e72e8f3550eb063ab981c36c7a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/27b118aebdd84161c8ff5ce49d9d536f2af10754",
          "url": "https://git.kernel.org/stable/c/27b118aebdd84161c8ff5ce49d9d536f2af10754"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4c4d7ddaf1d43780b106bedc692679f965dc5a3a",
          "url": "https://git.kernel.org/stable/c/4c4d7ddaf1d43780b106bedc692679f965dc5a3a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/56701bf9eeb63219e378cb7fcbd066ea4eaeeb50",
          "url": "https://git.kernel.org/stable/c/56701bf9eeb63219e378cb7fcbd066ea4eaeeb50"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/af0db3c1f898144846d4c172531a199bb3ca375d",
          "url": "https://git.kernel.org/stable/c/af0db3c1f898144846d4c172531a199bb3ca375d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cfec17721265e72e50cc69c6004fe3475cd38df2",
          "url": "https://git.kernel.org/stable/c/cfec17721265e72e50cc69c6004fe3475cd38df2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ed9b8e5016230868c8d813d9179523f729fec8c6",
          "url": "https://git.kernel.org/stable/c/ed9b8e5016230868c8d813d9179523f729fec8c6"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38714",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfsplus: fix slab-out-of-bounds in hfsplus_bnode_read()\n\nThe hfsplus_bnode_read() method can trigger the issue:\n\n[  174.852007][ T9784] ==================================================================\n[  174.852709][ T9784] BUG: KASAN: slab-out-of-bounds in hfsplus_bnode_read+0x2f4/0x360\n[  174.853412][ T9784] Read of size 8 at addr ffff88810b5fc6c0 by task repro/9784\n[  174.854059][ T9784]\n[  174.854272][ T9784] CPU: 1 UID: 0 PID: 9784 Comm: repro Not tainted 6.16.0-rc3 #7 PREEMPT(full)\n[  174.854281][ T9784] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n[  174.854286][ T9784] Call Trace:\n[  174.854289][ T9784]  <TASK>\n[  174.854292][ T9784]  dump_stack_lvl+0x10e/0x1f0\n[  174.854305][ T9784]  print_report+0xd0/0x660\n[  174.854315][ T9784]  ? __virt_addr_valid+0x81/0x610\n[  174.854323][ T9784]  ? __phys_addr+0xe8/0x180\n[  174.854330][ T9784]  ? hfsplus_bnode_read+0x2f4/0x360\n[  174.854337][ T9784]  kasan_report+0xc6/0x100\n[  174.854346][ T9784]  ? hfsplus_bnode_read+0x2f4/0x360\n[  174.854354][ T9784]  hfsplus_bnode_read+0x2f4/0x360\n[  174.854362][ T9784]  hfsplus_bnode_dump+0x2ec/0x380\n[  174.854370][ T9784]  ? __pfx_hfsplus_bnode_dump+0x10/0x10\n[  174.854377][ T9784]  ? hfsplus_bnode_write_u16+0x83/0xb0\n[  174.854385][ T9784]  ? srcu_gp_start+0xd0/0x310\n[  174.854393][ T9784]  ? __mark_inode_dirty+0x29e/0xe40\n[  174.854402][ T9784]  hfsplus_brec_remove+0x3d2/0x4e0\n[  174.854411][ T9784]  __hfsplus_delete_attr+0x290/0x3a0\n[  174.854419][ T9784]  ? __pfx_hfs_find_1st_rec_by_cnid+0x10/0x10\n[  174.854427][ T9784]  ? __pfx___hfsplus_delete_attr+0x10/0x10\n[  174.854436][ T9784]  ? __asan_memset+0x23/0x50\n[  174.854450][ T9784]  hfsplus_delete_all_attrs+0x262/0x320\n[  174.854459][ T9784]  ? __pfx_hfsplus_delete_all_attrs+0x10/0x10\n[  174.854469][ T9784]  ? rcu_is_watching+0x12/0xc0\n[  174.854476][ T9784]  ? __mark_inode_dirty+0x29e/0xe40\n[  174.854483][ T9784]  hfsplus_delete_cat+0x845/0xde0\n[  174.854493][ T9784]  ? __pfx_hfsplus_delete_cat+0x10/0x10\n[  174.854507][ T9784]  hfsplus_unlink+0x1ca/0x7c0\n[  174.854516][ T9784]  ? __pfx_hfsplus_unlink+0x10/0x10\n[  174.854525][ T9784]  ? down_write+0x148/0x200\n[  174.854532][ T9784]  ? __pfx_down_write+0x10/0x10\n[  174.854540][ T9784]  vfs_unlink+0x2fe/0x9b0\n[  174.854549][ T9784]  do_unlinkat+0x490/0x670\n[  174.854557][ T9784]  ? __pfx_do_unlinkat+0x10/0x10\n[  174.854565][ T9784]  ? __might_fault+0xbc/0x130\n[  174.854576][ T9784]  ? getname_flags.part.0+0x1c5/0x550\n[  174.854584][ T9784]  __x64_sys_unlink+0xc5/0x110\n[  174.854592][ T9784]  do_syscall_64+0xc9/0x480\n[  174.854600][ T9784]  entry_SYSCALL_64_after_hwframe+0x77/0x7f\n[  174.854608][ T9784] RIP: 0033:0x7f6fdf4c3167\n[  174.854614][ T9784] Code: f0 ff ff 73 01 c3 48 8b 0d 26 0d 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 08\n[  174.854622][ T9784] RSP: 002b:00007ffcb948bca8 EFLAGS: 00000206 ORIG_RAX: 0000000000000057\n[  174.854630][ T9784] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6fdf4c3167\n[  174.854636][ T9784] RDX: 00007ffcb948bcc0 RSI: 00007ffcb948bcc0 RDI: 00007ffcb948bd50\n[  174.854641][ T9784] RBP: 00007ffcb948cd90 R08: 0000000000000001 R09: 00007ffcb948bb40\n[  174.854645][ T9784] R10: 00007f6fdf564fc0 R11: 0000000000000206 R12: 0000561e1bc9c2d0\n[  174.854650][ T9784] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[  174.854658][ T9784]  </TASK>\n[  174.854661][ T9784]\n[  174.879281][ T9784] Allocated by task 9784:\n[  174.879664][ T9784]  kasan_save_stack+0x20/0x40\n[  174.880082][ T9784]  kasan_save_track+0x14/0x30\n[  174.880500][ T9784]  __kasan_kmalloc+0xaa/0xb0\n[  174.880908][ T9784]  __kmalloc_noprof+0x205/0x550\n[  174.881337][ T9784]  __hfs_bnode_create+0x107/0x890\n[  174.881779][ T9784]  hfsplus_bnode_find+0x2d0/0xd10\n[  174.882222][ T9784]  hfsplus_brec_find+0x2b0/0x520\n[  174.882659][ T9784]  hfsplus_delete_all_attrs+0x23b/0x3\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38714"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/032f7ed6717a4cd3714f9801be39fdfc7f1c7644",
          "url": "https://git.kernel.org/stable/c/032f7ed6717a4cd3714f9801be39fdfc7f1c7644"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/291b7f2538920aa229500dbdd6c5f0927a51bc8b",
          "url": "https://git.kernel.org/stable/c/291b7f2538920aa229500dbdd6c5f0927a51bc8b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/475d770c19929082aab43337e6c077d0e2043df3",
          "url": "https://git.kernel.org/stable/c/475d770c19929082aab43337e6c077d0e2043df3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5ab59229bef6063edf3a6fc2e3e3fd7cd2181b29",
          "url": "https://git.kernel.org/stable/c/5ab59229bef6063edf3a6fc2e3e3fd7cd2181b29"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7fa4cef8ea13b37811287ef60674c5fd1dd02ee6",
          "url": "https://git.kernel.org/stable/c/7fa4cef8ea13b37811287ef60674c5fd1dd02ee6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8583d067ae22b7f32ce5277ca5543ac8bf86a3e5",
          "url": "https://git.kernel.org/stable/c/8583d067ae22b7f32ce5277ca5543ac8bf86a3e5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a2abd574d2fe22b8464cf6df5abb6f24d809eac0",
          "url": "https://git.kernel.org/stable/c/a2abd574d2fe22b8464cf6df5abb6f24d809eac0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c80aa2aaaa5e69d5219c6af8ef7e754114bd08d2",
          "url": "https://git.kernel.org/stable/c/c80aa2aaaa5e69d5219c6af8ef7e754114bd08d2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ffee8a7bed0fbfe29da239a922b59c5db897c613",
          "url": "https://git.kernel.org/stable/c/ffee8a7bed0fbfe29da239a922b59c5db897c613"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53305",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix use-after-free\n\nFix potential use-after-free in l2cap_le_command_rej.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53305"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/149daab45922ab1ac7f0cbeacab7251a46bf5e63",
          "url": "https://git.kernel.org/stable/c/149daab45922ab1ac7f0cbeacab7251a46bf5e63"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1a40c56e8bff3e424724d78a9a6b3272dd8a371d",
          "url": "https://git.kernel.org/stable/c/1a40c56e8bff3e424724d78a9a6b3272dd8a371d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/255be68150291440657b2cdb09420b69441af3d8",
          "url": "https://git.kernel.org/stable/c/255be68150291440657b2cdb09420b69441af3d8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2958cf9f805b9f0bdc4a761bf6ea281eb8d44f8e",
          "url": "https://git.kernel.org/stable/c/2958cf9f805b9f0bdc4a761bf6ea281eb8d44f8e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/548a6b64b3c0688f01119a6fcccceb41f8c984e4",
          "url": "https://git.kernel.org/stable/c/548a6b64b3c0688f01119a6fcccceb41f8c984e4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e76bab1b7afa580cd76362540fc37551ada4359b",
          "url": "https://git.kernel.org/stable/c/e76bab1b7afa580cd76362540fc37551ada4359b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f752a0b334bb95fe9b42ecb511e0864e2768046f",
          "url": "https://git.kernel.org/stable/c/f752a0b334bb95fe9b42ecb511e0864e2768046f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fe49aa73cca6608714477b74bfc6874b9db979df",
          "url": "https://git.kernel.org/stable/c/fe49aa73cca6608714477b74bfc6874b9db979df"
        }
      ],
      "release_date": "2025-09-16T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53307",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrbd: avoid use-after-free in do_rbd_add() when rbd_dev_create() fails\n\nIf getting an ID or setting up a work queue in rbd_dev_create() fails,\nuse-after-free on rbd_dev->rbd_client, rbd_dev->spec and rbd_dev->opts\nis triggered in do_rbd_add().  The root cause is that the ownership of\nthese structures is transfered to rbd_dev prematurely and they all end\nup getting freed when rbd_dev_create() calls rbd_dev_free() prior to\nreturning to do_rbd_add().\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE, an\nincomplete patch submitted by Natalia Petrova <n.petrova@fintech.ru>.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53307"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/71da2a151ed1adb0aea4252b16d81b53012e7afd",
          "url": "https://git.kernel.org/stable/c/71da2a151ed1adb0aea4252b16d81b53012e7afd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9787b328c42c13c4f31e7d5042c4e877e9344068",
          "url": "https://git.kernel.org/stable/c/9787b328c42c13c4f31e7d5042c4e877e9344068"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a73783e4e0c4d1507794da211eeca75498544dff",
          "url": "https://git.kernel.org/stable/c/a73783e4e0c4d1507794da211eeca75498544dff"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ae16346078b1189aee934afd872d9f3d0a682c33",
          "url": "https://git.kernel.org/stable/c/ae16346078b1189aee934afd872d9f3d0a682c33"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cc8c0dd2984503ed09efa37bcafcef3d3da104e8",
          "url": "https://git.kernel.org/stable/c/cc8c0dd2984503ed09efa37bcafcef3d3da104e8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e3cbb4d60764295992c95344f2d779439e8b34ce",
          "url": "https://git.kernel.org/stable/c/e3cbb4d60764295992c95344f2d779439e8b34ce"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f7c4d9b133c7a04ca619355574e96b6abf209fba",
          "url": "https://git.kernel.org/stable/c/f7c4d9b133c7a04ca619355574e96b6abf209fba"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/faa7b683e436664fff5648426950718277831348",
          "url": "https://git.kernel.org/stable/c/faa7b683e436664fff5648426950718277831348"
        }
      ],
      "release_date": "2025-09-16T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38375",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-net: ensure the received length does not exceed allocated size\n\nIn xdp_linearize_page, when reading the following buffers from the ring,\nwe forget to check the received length with the true allocate size. This\ncan lead to an out-of-bound read. This commit adds that missing check.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38375"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/11f2d0e8be2b5e784ac45fa3da226492c3e506d8",
          "url": "https://git.kernel.org/stable/c/11f2d0e8be2b5e784ac45fa3da226492c3e506d8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/315dbdd7cdf6aa533829774caaf4d25f1fd20e73",
          "url": "https://git.kernel.org/stable/c/315dbdd7cdf6aa533829774caaf4d25f1fd20e73"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6aca3dad2145e864dfe4d1060f45eb1bac75dd58",
          "url": "https://git.kernel.org/stable/c/6aca3dad2145e864dfe4d1060f45eb1bac75dd58"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/773e95c268b5d859f51f7547559734fd2a57660c",
          "url": "https://git.kernel.org/stable/c/773e95c268b5d859f51f7547559734fd2a57660c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/80b971be4c37a4d23a7f1abc5ff33dc7733d649b",
          "url": "https://git.kernel.org/stable/c/80b971be4c37a4d23a7f1abc5ff33dc7733d649b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/982beb7582c193544eb9c6083937ec5ac1c9d651",
          "url": "https://git.kernel.org/stable/c/982beb7582c193544eb9c6083937ec5ac1c9d651"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bc68bc3563344ccdc57d1961457cdeecab8f81ef",
          "url": "https://git.kernel.org/stable/c/bc68bc3563344ccdc57d1961457cdeecab8f81ef"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ddc8649d363141fb3371dd81a73e1cb4ef8ed1e1",
          "url": "https://git.kernel.org/stable/c/ddc8649d363141fb3371dd81a73e1cb4ef8ed1e1"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-25T13:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38250",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_core: Fix use-after-free in vhci_flush()\n\nsyzbot reported use-after-free in vhci_flush() without repro. [0]\n\nFrom the splat, a thread close()d a vhci file descriptor while\nits device was being used by iotcl() on another thread.\n\nOnce the last fd refcnt is released, vhci_release() calls\nhci_unregister_dev(), hci_free_dev(), and kfree() for struct\nvhci_data, which is set to hci_dev->dev->driver_data.\n\nThe problem is that there is no synchronisation after unlinking\nhdev from hci_dev_list in hci_unregister_dev().  There might be\nanother thread still accessing the hdev which was fetched before\nthe unlink operation.\n\nWe can use SRCU for such synchronisation.\n\nLet's run hci_dev_reset() under SRCU and wait for its completion\nin hci_unregister_dev().\n\nAnother option would be to restore hci_dev->destruct(), which was\nremoved in commit 587ae086f6e4 (\"Bluetooth: Remove unused\nhci-destruct cb\").  However, this would not be a good solution, as\nwe should not run hci_unregister_dev() while there are in-flight\nioctl() requests, which could lead to another data-race KCSAN splat.\n\nNote that other drivers seem to have the same problem, for exmaple,\nvirtbt_remove().\n\n[0]:\nBUG: KASAN: slab-use-after-free in skb_queue_empty_lockless include/linux/skbuff.h:1891 [inline]\nBUG: KASAN: slab-use-after-free in skb_queue_purge_reason+0x99/0x360 net/core/skbuff.c:3937\nRead of size 8 at addr ffff88807cb8d858 by task syz.1.219/6718\n\nCPU: 1 UID: 0 PID: 6718 Comm: syz.1.219 Not tainted 6.16.0-rc1-syzkaller-00196-g08207f42d3ff #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025\nCall Trace:\n <TASK>\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:408 [inline]\n print_report+0xd2/0x2b0 mm/kasan/report.c:521\n kasan_report+0x118/0x150 mm/kasan/report.c:634\n skb_queue_empty_lockless include/linux/skbuff.h:1891 [inline]\n skb_queue_purge_reason+0x99/0x360 net/core/skbuff.c:3937\n skb_queue_purge include/linux/skbuff.h:3368 [inline]\n vhci_flush+0x44/0x50 drivers/bluetooth/hci_vhci.c:69\n hci_dev_do_reset net/bluetooth/hci_core.c:552 [inline]\n hci_dev_reset+0x420/0x5c0 net/bluetooth/hci_core.c:592\n sock_do_ioctl+0xd9/0x300 net/socket.c:1190\n sock_ioctl+0x576/0x790 net/socket.c:1311\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:907 [inline]\n __se_sys_ioctl+0xf9/0x170 fs/ioctl.c:893\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fcf5b98e929\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fcf5c7b9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 00007fcf5bbb6160 RCX: 00007fcf5b98e929\nRDX: 0000000000000000 RSI: 00000000400448cb RDI: 0000000000000009\nRBP: 00007fcf5ba10b39 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 0000000000000000 R14: 00007fcf5bbb6160 R15: 00007ffd6353d528\n </TASK>\n\nAllocated by task 6535:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3e/0x80 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4359\n kmalloc_noprof include/linux/slab.h:905 [inline]\n kzalloc_noprof include/linux/slab.h:1039 [inline]\n vhci_open+0x57/0x360 drivers/bluetooth/hci_vhci.c:635\n misc_open+0x2bc/0x330 drivers/char/misc.c:161\n chrdev_open+0x4c9/0x5e0 fs/char_dev.c:414\n do_dentry_open+0xdf0/0x1970 fs/open.c:964\n vfs_open+0x3b/0x340 fs/open.c:1094\n do_open fs/namei.c:3887 [inline]\n path_openat+0x2ee5/0x3830 fs/name\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38250"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0e5c144c557df910ab64d9c25d06399a9a735e65",
          "url": "https://git.kernel.org/stable/c/0e5c144c557df910ab64d9c25d06399a9a735e65"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1d6123102e9fbedc8d25bf4731da6d513173e49e",
          "url": "https://git.kernel.org/stable/c/1d6123102e9fbedc8d25bf4731da6d513173e49e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bc0819a25e04cd68ef3568cfa51b63118fea39a7",
          "url": "https://git.kernel.org/stable/c/bc0819a25e04cd68ef3568cfa51b63118fea39a7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ce23b73f0f27e2dbeb81734a79db710f05aa33c6",
          "url": "https://git.kernel.org/stable/c/ce23b73f0f27e2dbeb81734a79db710f05aa33c6"
        }
      ],
      "release_date": "2025-07-09T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38556",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: core: Harden s32ton() against conversion to 0 bits\n\nTesting by the syzbot fuzzer showed that the HID core gets a\nshift-out-of-bounds exception when it tries to convert a 32-bit\nquantity to a 0-bit quantity.  Ideally this should never occur, but\nthere are buggy devices and some might have a report field with size\nset to zero; we shouldn't reject the report or the device just because\nof that.\n\nInstead, harden the s32ton() routine so that it returns a reasonable\nresult instead of crashing when it is called with the number of bits\nset to 0 -- the same as what snto32() does.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38556"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3c86548a20d7bc2861aa4de044991a327bebad1a",
          "url": "https://git.kernel.org/stable/c/3c86548a20d7bc2861aa4de044991a327bebad1a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6cdf6c708717c5c6897d0800a1793e83757c7491",
          "url": "https://git.kernel.org/stable/c/6cdf6c708717c5c6897d0800a1793e83757c7491"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/810189546cb6c8f36443ed091d91f1f5d2fc2ec7",
          "url": "https://git.kernel.org/stable/c/810189546cb6c8f36443ed091d91f1f5d2fc2ec7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/865ad8469fa24de1559f247d9426ab01e5ce3a56",
          "url": "https://git.kernel.org/stable/c/865ad8469fa24de1559f247d9426ab01e5ce3a56"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8b4a94b1510f6a46ec48494b52ee8f67eb4fc836",
          "url": "https://git.kernel.org/stable/c/8b4a94b1510f6a46ec48494b52ee8f67eb4fc836"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a6b87bfc2ab5bccb7ad953693c85d9062aef3fdd",
          "url": "https://git.kernel.org/stable/c/a6b87bfc2ab5bccb7ad953693c85d9062aef3fdd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d3b504146c111548ab60b6ef7aad00bfb1db05a2",
          "url": "https://git.kernel.org/stable/c/d3b504146c111548ab60b6ef7aad00bfb1db05a2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/eeeaba737919bdce9885e2a00ac2912f61a3684d",
          "url": "https://git.kernel.org/stable/c/eeeaba737919bdce9885e2a00ac2912f61a3684d"
        }
      ],
      "release_date": "2025-08-19T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53541",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: rawnand: brcmnand: Fix potential out-of-bounds access in oob write\n\nWhen the oob buffer length is not in multiple of words, the oob write\nfunction does out-of-bounds read on the oob source buffer at the last\niteration. Fix that by always checking length limit on the oob buffer\nread and fill with 0xff when reaching the end of the buffer to the oob\nregisters.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53541"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/14b1d00520b4d6a4818364334ce472b79cfc8976",
          "url": "https://git.kernel.org/stable/c/14b1d00520b4d6a4818364334ce472b79cfc8976"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2353b7bb61e45e7cfd21505d0c6747ac8c9496a1",
          "url": "https://git.kernel.org/stable/c/2353b7bb61e45e7cfd21505d0c6747ac8c9496a1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2bc3d6ac704ea7263175ea3da663fdbbb7f3dd8b",
          "url": "https://git.kernel.org/stable/c/2bc3d6ac704ea7263175ea3da663fdbbb7f3dd8b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/45fe4ad7f439799ee1b7b5f80bf82e8b34a98d25",
          "url": "https://git.kernel.org/stable/c/45fe4ad7f439799ee1b7b5f80bf82e8b34a98d25"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5d53244186c9ac58cb88d76a0958ca55b83a15cd",
          "url": "https://git.kernel.org/stable/c/5d53244186c9ac58cb88d76a0958ca55b83a15cd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/648d1150a688698e37f7aaf302860180901cb30e",
          "url": "https://git.kernel.org/stable/c/648d1150a688698e37f7aaf302860180901cb30e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/aae45746f4aee9818296e0500e0703e9d8caa5b8",
          "url": "https://git.kernel.org/stable/c/aae45746f4aee9818296e0500e0703e9d8caa5b8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d00b031266514a9395124704630b056a5185ec17",
          "url": "https://git.kernel.org/stable/c/d00b031266514a9395124704630b056a5185ec17"
        }
      ],
      "release_date": "2025-10-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39760",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: core: config: Prevent OOB read in SS endpoint companion parsing\n\nusb_parse_ss_endpoint_companion() checks descriptor type before length,\nenabling a potentially odd read outside of the buffer size.\n\nFix this up by checking the size first before looking at any of the\nfields in the descriptor.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39760"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/058ad2b722812708fe90567875704ae36563e33b",
          "url": "https://git.kernel.org/stable/c/058ad2b722812708fe90567875704ae36563e33b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4fe6f472f0beef4281e6f03bc38a910a33be663f",
          "url": "https://git.kernel.org/stable/c/4fe6f472f0beef4281e6f03bc38a910a33be663f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5badd56c711e2c8371d1670f9bd486697575423c",
          "url": "https://git.kernel.org/stable/c/5badd56c711e2c8371d1670f9bd486697575423c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5c3097ede7835d3caf6543eb70ff689af4550cd2",
          "url": "https://git.kernel.org/stable/c/5c3097ede7835d3caf6543eb70ff689af4550cd2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9512510cee7d1becdb0e9413fdd3ab783e4e30ee",
          "url": "https://git.kernel.org/stable/c/9512510cee7d1becdb0e9413fdd3ab783e4e30ee"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9843bcb187cb933861f7805022e6873905f669e4",
          "url": "https://git.kernel.org/stable/c/9843bcb187cb933861f7805022e6873905f669e4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b10e0f868067c6f25bbfabdcf3e1e6432c24ca55",
          "url": "https://git.kernel.org/stable/c/b10e0f868067c6f25bbfabdcf3e1e6432c24ca55"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cf16f408364efd8a68f39011a3b073c83a03612d",
          "url": "https://git.kernel.org/stable/c/cf16f408364efd8a68f39011a3b073c83a03612d"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-09-11T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53506",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nudf: Do not bother merging very long extents\n\nWhen merging very long extents we try to push as much length as possible\nto the first extent. However this is unnecessarily complicated and not\nreally worth the trouble. Furthermore there was a bug in the logic\nresulting in corrupting extents in the file as syzbot reproducer shows.\nSo just don't bother with the merging of extents that are too long\ntogether.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53506"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3d20e3b768aff32112bdce8d3219d923ae75f9f1",
          "url": "https://git.kernel.org/stable/c/3d20e3b768aff32112bdce8d3219d923ae75f9f1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/53cafe1d6d8ef9f93318e5bfccc0d24f27d41ced",
          "url": "https://git.kernel.org/stable/c/53cafe1d6d8ef9f93318e5bfccc0d24f27d41ced"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5d029799d381a9ee06209a222cae75f04c5d5304",
          "url": "https://git.kernel.org/stable/c/5d029799d381a9ee06209a222cae75f04c5d5304"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7a965da79f2d22601f329cbfce588386b0847544",
          "url": "https://git.kernel.org/stable/c/7a965da79f2d22601f329cbfce588386b0847544"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/965982feb333aefa9256c0fe188b5f1b958aef63",
          "url": "https://git.kernel.org/stable/c/965982feb333aefa9256c0fe188b5f1b958aef63"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9a8d602f0723586e668bae7e65c832ceb9bcc8bc",
          "url": "https://git.kernel.org/stable/c/9a8d602f0723586e668bae7e65c832ceb9bcc8bc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/adac9ac6d2e04ea0782b91a00ba10706002f3ec4",
          "url": "https://git.kernel.org/stable/c/adac9ac6d2e04ea0782b91a00ba10706002f3ec4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d52252a1de4cf96a34f722b0cd8902d8ff78eb57",
          "url": "https://git.kernel.org/stable/c/d52252a1de4cf96a34f722b0cd8902d8ff78eb57"
        }
      ],
      "release_date": "2025-10-01T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-39993",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nmedia: rc: fix races with imon_disconnect()\nSyzbot reports a KASAN issue as below:\nBUG: KASAN: use-after-free in __create_pipe include/linux/usb.h:1945 [inline]\nBUG: KASAN: use-after-free in send_packet+0xa2d/0xbc0 drivers/media/rc/imon.c:627\nRead of size 4 at addr ffff8880256fb000 by task syz-executor314/4465\nCPU: 2 PID: 4465 Comm: syz-executor314 Not tainted 6.0.0-rc1-syzkaller #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014\nCall Trace:\n<TASK>\n__dump_stack lib/dump_stack.c:88 [inline]\ndump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\nprint_address_description mm/kasan/report.c:317 [inline]\nprint_report.cold+0x2ba/0x6e9 mm/kasan/report.c:433\nkasan_report+0xb1/0x1e0 mm/kasan/report.c:495\n__create_pipe include/linux/usb.h:1945 [inline]\nsend_packet+0xa2d/0xbc0 drivers/media/rc/imon.c:627\nvfd_write+0x2d9/0x550 drivers/media/rc/imon.c:991\nvfs_write+0x2d7/0xdd0 fs/read_write.c:576\nksys_write+0x127/0x250 fs/read_write.c:631\ndo_syscall_x64 arch/x86/entry/common.c:50 [inline]\ndo_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\nentry_SYSCALL_64_after_hwframe+0x63/0xcd\nThe iMON driver improperly releases the usb_device reference in\nimon_disconnect without coordinating with active users of the\ndevice.\nSpecifically, the fields usbdev_intf0 and usbdev_intf1 are not\nprotected by the users counter (ictx->users). During probe,\nimon_init_intf0 or imon_init_intf1 increments the usb_device\nreference count depending on the interface. However, during\ndisconnect, usb_put_dev is called unconditionally, regardless of\nactual usage.\nAs a result, if vfd_write or other operations are still in\nprogress after disconnect, this can lead to a use-after-free of\nthe usb_device pointer.\nThread 1 vfd_write                      Thread 2 imon_disconnect\n...\nif\nusb_put_dev(ictx->usbdev_intf0)\nelse\nusb_put_dev(ictx->usbdev_intf1)\n...\nwhile\nsend_packet\nif\npipe = usb_sndintpipe(\nictx->usbdev_intf0) UAF\nelse\npipe = usb_sndctrlpipe(\nictx->usbdev_intf0, 0) UAF\nGuard access to usbdev_intf0 and usbdev_intf1 after disconnect by\nchecking ictx->disconnected in all writer paths. Add early return\nwith -ENODEV in send_packet(), vfd_write(), lcd_write() and\ndisplay_open() if the device is no longer present.\nSet and read ictx->disconnected under ictx->lock to ensure memory\nsynchronization. Acquire the lock in imon_disconnect() before setting\nthe flag to synchronize with any ongoing operations.\nEnsure writers exit early and safely after disconnect before the USB\ncore proceeds with cleanup.\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-39993"
        }
      ],
      "release_date": "2025-10-15T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37810",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc3: gadget: check that event count does not exceed event buffer length\n\nThe event count is read from register DWC3_GEVNTCOUNT.\nThere is a check for the count being zero, but not for exceeding the\nevent buffer length.\nCheck that event count does not exceed event buffer length,\navoiding an out-of-bounds access when memcpy'ing the event.\nCrash log:\nUnable to handle kernel paging request at virtual address ffffffc0129be000\npc : __memcpy+0x114/0x180\nlr : dwc3_check_event_buf+0xec/0x348\nx3 : 0000000000000030 x2 : 000000000000dfc4\nx1 : ffffffc0129be000 x0 : ffffff87aad60080\nCall trace:\n__memcpy+0x114/0x180\ndwc3_interrupt+0x24/0x34",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37810"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/015c39f38e69a491d2abd5e98869a500a9459b3b",
          "url": "https://git.kernel.org/stable/c/015c39f38e69a491d2abd5e98869a500a9459b3b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/52a7c9d930b95aa8b1620edaba4818040c32631f",
          "url": "https://git.kernel.org/stable/c/52a7c9d930b95aa8b1620edaba4818040c32631f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/63ccd26cd1f6600421795f6ca3e625076be06c9f",
          "url": "https://git.kernel.org/stable/c/63ccd26cd1f6600421795f6ca3e625076be06c9f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/99d655119b870ee60e4dbf310aa9a1ed8d9ede3d",
          "url": "https://git.kernel.org/stable/c/99d655119b870ee60e4dbf310aa9a1ed8d9ede3d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a44547015287a19001384fe94dbff84c92ce4ee1",
          "url": "https://git.kernel.org/stable/c/a44547015287a19001384fe94dbff84c92ce4ee1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b43225948b231b3f331194010f84512bee4d9f59",
          "url": "https://git.kernel.org/stable/c/b43225948b231b3f331194010f84512bee4d9f59"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c0079630f268843a25ed75226169cba40e0d8880",
          "url": "https://git.kernel.org/stable/c/c0079630f268843a25ed75226169cba40e0d8880"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c4d80e41cb42008dceb35e5dbf52574d93beac0d",
          "url": "https://git.kernel.org/stable/c/c4d80e41cb42008dceb35e5dbf52574d93beac0d"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-08T07:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38416",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFC: nci: uart: Set tty->disc_data only in success path\n\nSetting tty->disc_data before opening the NCI device means we need to\nclean it up on error paths.  This also opens some short window if device\nstarts sending data, even before NCIUARTSETDRIVER IOCTL succeeded\n(broken hardware?).  Close the window by exposing tty->disc_data only on\nthe success path, when opening of the NCI device and try_module_get()\nsucceeds.\n\nThe code differs in error path in one aspect: tty->disc_data won't be\never assigned thus NULL-ified.  This however should not be relevant\ndifference, because of \"tty->disc_data=NULL\" in nci_uart_tty_open().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38416"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/000bfbc6bc334a93fffca8f5aa9583e7b6356cb5",
          "url": "https://git.kernel.org/stable/c/000bfbc6bc334a93fffca8f5aa9583e7b6356cb5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/55c3dbd8389636161090a2b2b6d2d709b9602e9c",
          "url": "https://git.kernel.org/stable/c/55c3dbd8389636161090a2b2b6d2d709b9602e9c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a514fca2b8e95838a3ba600f31a18fa60b76d893",
          "url": "https://git.kernel.org/stable/c/a514fca2b8e95838a3ba600f31a18fa60b76d893"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a8acc7080ad55c5402a1b818b3008998247dda87",
          "url": "https://git.kernel.org/stable/c/a8acc7080ad55c5402a1b818b3008998247dda87"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ac6992f72bd8e22679c1e147ac214de6a7093c23",
          "url": "https://git.kernel.org/stable/c/ac6992f72bd8e22679c1e147ac214de6a7093c23"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dc7722619a9c307e9938d735cf4a2210d3d48dcb",
          "url": "https://git.kernel.org/stable/c/dc7722619a9c307e9938d735cf4a2210d3d48dcb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e9799db771b2d574d5bf0dfb3177485e5f40d4d6",
          "url": "https://git.kernel.org/stable/c/e9799db771b2d574d5bf0dfb3177485e5f40d4d6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fc27ab48904ceb7e4792f0c400f1ef175edf16fe",
          "url": "https://git.kernel.org/stable/c/fc27ab48904ceb7e4792f0c400f1ef175edf16fe"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-25T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53596",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers: base: Free devm resources when unregistering a device\n\nIn the current code, devres_release_all() only gets called if the device\nhas a bus and has been probed.\n\nThis leads to issues when using bus-less or driver-less devices where\nthe device might never get freed if a managed resource holds a reference\nto the device. This is happening in the DRM framework for example.\n\nWe should thus call devres_release_all() in the device_del() function to\nmake sure that the device-managed actions are properly executed when the\ndevice is unregistered, even if it has neither a bus nor a driver.\n\nThis is effectively the same change than commit 2f8d16a996da (\"devres:\nrelease resources on device_del()\") that got reverted by commit\na525a3ddeaca (\"driver core: free devres in device_release\") over\nmemory leaks concerns.\n\nThis patch effectively combines the two commits mentioned above to\nrelease the resources both on device_del() and device_release() and get\nthe best of both worlds.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53596"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/297992e5c63528e603666e36081836204fc36ec9",
          "url": "https://git.kernel.org/stable/c/297992e5c63528e603666e36081836204fc36ec9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3bcc4c2a096e8342c8c719e595ce15de212694dd",
          "url": "https://git.kernel.org/stable/c/3bcc4c2a096e8342c8c719e595ce15de212694dd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/699fb50d99039a50e7494de644f96c889279aca3",
          "url": "https://git.kernel.org/stable/c/699fb50d99039a50e7494de644f96c889279aca3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c8c426fae26086a0ca8ab6cc6da2de79810ec038",
          "url": "https://git.kernel.org/stable/c/c8c426fae26086a0ca8ab6cc6da2de79810ec038"
        }
      ],
      "release_date": "2025-10-04T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-22083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvhost-scsi: Fix handling of multiple calls to vhost_scsi_set_endpoint\n\nIf vhost_scsi_set_endpoint is called multiple times without a\nvhost_scsi_clear_endpoint between them, we can hit multiple bugs\nfound by Haoran Zhang:\n\n1. Use-after-free when no tpgs are found:\n\nThis fixes a use after free that occurs when vhost_scsi_set_endpoint is\ncalled more than once and calls after the first call do not find any\ntpgs to add to the vs_tpg. When vhost_scsi_set_endpoint first finds\ntpgs to add to the vs_tpg array match=true, so we will do:\n\nvhost_vq_set_backend(vq, vs_tpg);\n...\n\nkfree(vs->vs_tpg);\nvs->vs_tpg = vs_tpg;\n\nIf vhost_scsi_set_endpoint is called again and no tpgs are found\nmatch=false so we skip the vhost_vq_set_backend call leaving the\npointer to the vs_tpg we then free via:\n\nkfree(vs->vs_tpg);\nvs->vs_tpg = vs_tpg;\n\nIf a scsi request is then sent we do:\n\nvhost_scsi_handle_vq -> vhost_scsi_get_req -> vhost_vq_get_backend\n\nwhich sees the vs_tpg we just did a kfree on.\n\n2. Tpg dir removal hang:\n\nThis patch fixes an issue where we cannot remove a LIO/target layer\ntpg (and structs above it like the target) dir due to the refcount\ndropping to -1.\n\nThe problem is that if vhost_scsi_set_endpoint detects a tpg is already\nin the vs->vs_tpg array or if the tpg has been removed so\ntarget_depend_item fails, the undepend goto handler will do\ntarget_undepend_item on all tpgs in the vs_tpg array dropping their\nrefcount to 0. At this time vs_tpg contains both the tpgs we have added\nin the current vhost_scsi_set_endpoint call as well as tpgs we added in\nprevious calls which are also in vs->vs_tpg.\n\nLater, when vhost_scsi_clear_endpoint runs it will do\ntarget_undepend_item on all the tpgs in the vs->vs_tpg which will drop\ntheir refcount to -1. Userspace will then not be able to remove the tpg\nand will hang when it tries to do rmdir on the tpg dir.\n\n3. Tpg leak:\n\nThis fixes a bug where we can leak tpgs and cause them to be\nun-removable because the target name is overwritten when\nvhost_scsi_set_endpoint is called multiple times but with different\ntarget names.\n\nThe bug occurs if a user has called VHOST_SCSI_SET_ENDPOINT and setup\na vhost-scsi device to target/tpg mapping, then calls\nVHOST_SCSI_SET_ENDPOINT again with a new target name that has tpgs we\nhaven't seen before (target1 has tpg1 but target2 has tpg2). When this\nhappens we don't teardown the old target tpg mapping and just overwrite\nthe target name and the vs->vs_tpg array. Later when we do\nvhost_scsi_clear_endpoint, we are passed in either target1 or target2's\nname and we will only match that target's tpgs when we loop over the\nvs->vs_tpg. We will then return from the function without doing\ntarget_undepend_item on the tpgs.\n\nBecause of all these bugs, it looks like being able to call\nvhost_scsi_set_endpoint multiple times was never supported. The major\nuser, QEMU, already has checks to prevent this use case. So to fix the\nissues, this patch prevents vhost_scsi_set_endpoint from being called\nif it's already successfully added tpgs. To add, remove or change the\ntpg config or target name, you must do a vhost_scsi_clear_endpoint\nfirst.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-22083"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2b34bdc42df047794542f3e220fe989124e4499a",
          "url": "https://git.kernel.org/stable/c/2b34bdc42df047794542f3e220fe989124e4499a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3a19eb3d9818e28f14c818a18dc913344a52ca92",
          "url": "https://git.kernel.org/stable/c/3a19eb3d9818e28f14c818a18dc913344a52ca92"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3fd054baf382a426bbf5135ede0fc5673db74d3e",
          "url": "https://git.kernel.org/stable/c/3fd054baf382a426bbf5135ede0fc5673db74d3e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/451c72f5e7cf5d339a6410a635cee0825687c3dc",
          "url": "https://git.kernel.org/stable/c/451c72f5e7cf5d339a6410a635cee0825687c3dc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5dd639a1646ef5fe8f4bf270fad47c5c3755b9b6",
          "url": "https://git.kernel.org/stable/c/5dd639a1646ef5fe8f4bf270fad47c5c3755b9b6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/63b449f73ab0dcc0ba11ceaa4c5c70bc86ccf03c",
          "url": "https://git.kernel.org/stable/c/63b449f73ab0dcc0ba11ceaa4c5c70bc86ccf03c"
        }
      ],
      "release_date": "2025-04-16T15:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-37739",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid out-of-bounds access in f2fs_truncate_inode_blocks()\n\nsyzbot reports an UBSAN issue as below:\n\n------------[ cut here ]------------\nUBSAN: array-index-out-of-bounds in fs/f2fs/node.h:381:10\nindex 18446744073709550692 is out of range for type '__le32[5]' (aka 'unsigned int[5]')\nCPU: 0 UID: 0 PID: 5318 Comm: syz.0.0 Not tainted 6.14.0-rc3-syzkaller-00060-g6537cfb395f3 #0\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n ubsan_epilogue lib/ubsan.c:231 [inline]\n __ubsan_handle_out_of_bounds+0x121/0x150 lib/ubsan.c:429\n get_nid fs/f2fs/node.h:381 [inline]\n f2fs_truncate_inode_blocks+0xa5e/0xf60 fs/f2fs/node.c:1181\n f2fs_do_truncate_blocks+0x782/0x1030 fs/f2fs/file.c:808\n f2fs_truncate_blocks+0x10d/0x300 fs/f2fs/file.c:836\n f2fs_truncate+0x417/0x720 fs/f2fs/file.c:886\n f2fs_file_write_iter+0x1bdb/0x2550 fs/f2fs/file.c:5093\n aio_write+0x56b/0x7c0 fs/aio.c:1633\n io_submit_one+0x8a7/0x18a0 fs/aio.c:2052\n __do_sys_io_submit fs/aio.c:2111 [inline]\n __se_sys_io_submit+0x171/0x2e0 fs/aio.c:2081\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f238798cde9\n\nindex 18446744073709550692 (decimal, unsigned long long)\n= 0xfffffffffffffc64 (hexadecimal, unsigned long long)\n= -924 (decimal, long long)\n\nIn f2fs_truncate_inode_blocks(), UBSAN detects that get_nid() tries to\naccess .i_nid[-924], it means both offset[0] and level should zero.\n\nThe possible case should be in f2fs_do_truncate_blocks(), we try to\ntruncate inode size to zero, however, dn.ofs_in_node is zero and\ndn.node_page is not an inode page, so it fails to truncate inode page,\nand then pass zeroed free_from to f2fs_truncate_inode_blocks(), result\nin this issue.\n\n\tif (dn.ofs_in_node || IS_INODE(dn.node_page)) {\n\t\tf2fs_truncate_data_blocks_range(&dn, count);\n\t\tfree_from += count;\n\t}\n\nI guess the reason why dn.node_page is not an inode page could be: there\nare multiple nat entries share the same node block address, once the node\nblock address was reused, f2fs_get_node_page() may load a non-inode block.\n\nLet's add a sanity check for such condition to avoid out-of-bounds access\nissue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-37739"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/67e16ccba74dd8de0a7b10062f1e02d77432f573",
          "url": "https://git.kernel.org/stable/c/67e16ccba74dd8de0a7b10062f1e02d77432f573"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6ba8b41d0aa4b82f90f0c416cb53fcef9696525d",
          "url": "https://git.kernel.org/stable/c/6ba8b41d0aa4b82f90f0c416cb53fcef9696525d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8b5e5aac44fee122947a269f9034c048e4c295de",
          "url": "https://git.kernel.org/stable/c/8b5e5aac44fee122947a269f9034c048e4c295de"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/98dbf2af63de0b551082c9bc48333910e009b09f",
          "url": "https://git.kernel.org/stable/c/98dbf2af63de0b551082c9bc48333910e009b09f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a67e1bf03c609a751d1740a1789af25e599966fa",
          "url": "https://git.kernel.org/stable/c/a67e1bf03c609a751d1740a1789af25e599966fa"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d7242fd7946d4cba0411effb6b5048ca55125747",
          "url": "https://git.kernel.org/stable/c/d7242fd7946d4cba0411effb6b5048ca55125747"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e6494977bd4a83862118a05f57a8df40256951c0",
          "url": "https://git.kernel.org/stable/c/e6494977bd4a83862118a05f57a8df40256951c0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ecc461331604b07cdbdb7360dbdf78471653264c",
          "url": "https://git.kernel.org/stable/c/ecc461331604b07cdbdb7360dbdf78471653264c"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-05-01T13:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38212",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipc: fix to protect IPCS lookups using RCU\n\nsyzbot reported that it discovered a use-after-free vulnerability, [0]\n\n[0]: https://lore.kernel.org/all/67af13f8.050a0220.21dd3.0038.GAE@google.com/\n\nidr_for_each() is protected by rwsem, but this is not enough.  If it is\nnot protected by RCU read-critical region, when idr_for_each() calls\nradix_tree_node_free() through call_rcu() to free the radix_tree_node\nstructure, the node will be freed immediately, and when reading the next\nnode in radix_tree_for_each_slot(), the already freed memory may be read.\n\nTherefore, we need to add code to make sure that idr_for_each() is\nprotected within the RCU read-critical region when we call it in\nshm_destroy_orphaned().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38212"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5180561afff8e0f029073c8c8117c95c6512d1f9",
          "url": "https://git.kernel.org/stable/c/5180561afff8e0f029073c8c8117c95c6512d1f9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5f1e1573bf103303944fd7225559de5d8297539c",
          "url": "https://git.kernel.org/stable/c/5f1e1573bf103303944fd7225559de5d8297539c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/68c173ea138b66d7dd1fd980c9bc578a18e11884",
          "url": "https://git.kernel.org/stable/c/68c173ea138b66d7dd1fd980c9bc578a18e11884"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/74bc813d11c30e28fc5261dc877cca662ccfac68",
          "url": "https://git.kernel.org/stable/c/74bc813d11c30e28fc5261dc877cca662ccfac68"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/78297d53d3878d43c1d627d20cd09f611fa4b91d",
          "url": "https://git.kernel.org/stable/c/78297d53d3878d43c1d627d20cd09f611fa4b91d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b0b6bf90ce2699a574b3683e22c44d0dcdd7a057",
          "url": "https://git.kernel.org/stable/c/b0b6bf90ce2699a574b3683e22c44d0dcdd7a057"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b968ba8bfd9f90914957bbbd815413bf6a98eca7",
          "url": "https://git.kernel.org/stable/c/b968ba8bfd9f90914957bbbd815413bf6a98eca7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d66adabe91803ef34a8b90613c81267b5ded1472",
          "url": "https://git.kernel.org/stable/c/d66adabe91803ef34a8b90613c81267b5ded1472"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-04T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38313",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbus: fsl-mc: fix double-free on mc_dev\n\nThe blamed commit tried to simplify how the deallocations are done but,\nin the process, introduced a double-free on the mc_dev variable.\n\nIn case the MC device is a DPRC, a new mc_bus is allocated and the\nmc_dev variable is just a reference to one of its fields. In this\ncircumstance, on the error path only the mc_bus should be freed.\n\nThis commit introduces back the following checkpatch warning which is a\nfalse-positive.\n\nWARNING: kfree(NULL) is safe and this check is probably not required\n+       if (mc_bus)\n+               kfree(mc_bus);",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
          "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
          "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38313"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/12e4431e5078847791936820bd39df9e1ee26d2e",
          "url": "https://git.kernel.org/stable/c/12e4431e5078847791936820bd39df9e1ee26d2e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1d5baab39e5b09a76870b345cdee7933871b881f",
          "url": "https://git.kernel.org/stable/c/1d5baab39e5b09a76870b345cdee7933871b881f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3135e03a92f6b5259d0a7f25f728e9e7866ede3f",
          "url": "https://git.kernel.org/stable/c/3135e03a92f6b5259d0a7f25f728e9e7866ede3f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4b23c46eb2d88924b93aca647bde9a4b9cf62cf9",
          "url": "https://git.kernel.org/stable/c/4b23c46eb2d88924b93aca647bde9a4b9cf62cf9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7002b954c4a8b9965ba0f139812ee4a6f71beac8",
          "url": "https://git.kernel.org/stable/c/7002b954c4a8b9965ba0f139812ee4a6f71beac8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/873d47114fd5e5a1cad2018843671537cc71ac84",
          "url": "https://git.kernel.org/stable/c/873d47114fd5e5a1cad2018843671537cc71ac84"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b2057374f326303c86d8423415ab58656eebc695",
          "url": "https://git.kernel.org/stable/c/b2057374f326303c86d8423415ab58656eebc695"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d694bf8a9acdbd061596f3e7549bc8cb70750a60",
          "url": "https://git.kernel.org/stable/c/d694bf8a9acdbd061596f3e7549bc8cb70750a60"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-10T08:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-18T11:14:57.976597Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495",
          "product_ids": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1773832495"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-buildinfo-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-cloud-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-doc-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-headers-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-image-unsigned-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-libc-dev-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-source-4.15.0-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-generic-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-4.15.0-254-tuxcare.els42-lowlatency-0:4.15.0-254.265.amd64",
            "Ubuntu-18:linux-tools-common-0:4.15.0-254.265.all",
            "Ubuntu-18:linux-tools-host-0:4.15.0-254.265.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}