{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "kvm: initialize all of the kvm_debugregs structure before sending it to userspace {CVE-2023-1513}\n- wifi: mac80211: fix MBSSID parsing use-after-free {CVE-2022-42719}\n- mac80211: always allocate struct ieee802_11_elems {CVE-2022-42719}\n- netfilter: nf_tables: initialize registers in nft_do_chain() {CVE-2022-1016}\n- xprtrdma: fix incorrect header size calculations {CVE-2022-0812}\n- net: usb: fix memory leak in smsc75xx_bind {CVE-2021-47171}\n- i2c: i801: Don't generate an interrupt on bus reset {CVE-2021-47153}\n- pid: take a reference when initializing `cad_pid` {CVE-2021-47118}\n- Input: appletouch - initialize work before device registration {CVE-2021-46932}\n- HID: usbhid: fix info leak in hid_submit_ctrl {CVE-2021-46906}\n- quota: check block number when reading the block in quota file {CVE-2021-45868}\n- mwifiex: Fix skb_over_panic in mwifiex_usb_recv() {CVE-2021-43976}\n- atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait {CVE-2021-43975}\n- isdn: cpai: check ctr->cnr to avoid array index out of bound {CVE-2021-43389}\n- usb: hso: fix error handling code of hso_create_net_device {CVE-2021-37159}\n- can: bcm: fix infoleak in struct bcm_msg_head {CVE-2021-34693}\n- dm ioctl: fix out of bounds array access when no devices {CVE-2021-31916}\n- KVM: x86: hyper-v: Fix Hyper-V context null-ptr-deref {CVE-2021-30178}\n- perf/x86/intel: Fix a crash caused by zero PEBS status {CVE-2021-28971}\n- btrfs: fix race when cloning extent buffer during rewind of an old root {CVE-2021-28964}\n- ovl: fix missing negative dentry check in ovl_rename() {CVE-2021-20321}\n- drm/ttm/nouveau: don't call tt destroy callback on alloc failure. {CVE-2021-20292}\n- bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds() {CVE-2021-4159}\n- btrfs: unlock newly allocated extent buffer after error {CVE-2021-4149}\n- tracing: Fix bug in rb_per_cpu_empty() that might cause deadloop. {CVE-2021-3679}\n- net: mac802154: Fix general protection fault {CVE-2021-3659}\n- nfsd4: readdirplus shouldn't return parent of export {CVE-2021-3178}\n- Bluetooth: SMP: Fail if remote and local public keys are identical {CVE-2021-0129}\n- drm/nouveau: clean up all clients on device removal {CVE-2020-27820}\n- drm/nouveau: Add a dedicated mutex for the clients list {CVE-2020-27820}\n- drm/nouveau: use drm_dev_unplug() during device removal {CVE-2020-27820}\n- Bluetooth: SMP: Fail if remote and local public keys are identical {CVE-2020-26555}\n- vsock: Fix memory leak in vsock_connect() {CVE-2022-3629}\n- RDMA/core: Don't infoleak GRH fields {CVE-2021-3923}\n- xen/netfront: force data bouncing when backend is untrusted {CVE-2022-33741}\n- net: Rename and export copy_skb_header\n- floppy: use a statically allocated error counter {CVE-2022-1652}\n- fuse: fix pipe buffer lifetime for direct_io {CVE-2022-1011}\n- aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts {CVE-2024-26898}\n- smb: client: fix use-after-free bug in cifs_debug_data_proc_show() {CVE-2023-52752}\n- media: pvrusb2: fix use after free on context disconnection {CVE-2023-52445}\n- media: dm1105: Fix use after free bug in dm1105_remove due to race condition {CVE-2023-35824}\n- perf: Fix perf_event_validate_size() lockdep splat {CVE-2023-6931}\n- perf: Fix perf_event_validate_size() {CVE-2023-6931}\n- net/sched: sch_hfsc: Ensure inner classes have fsc curve {CVE-2023-4623}\n- relayfs: fix out-of-bounds access in relay_file_read {CVE-2023-3268}\n- xfs: verify buffer contents when we skip log replay {CVE-2023-2124}\n- Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition {CVE-2023-1989}\n- Fix double fget() in vhost_net_set_backend() {CVE-2023-1838}\n- net/sched: cls_tcindex: downgrade to imperfect hash {CVE-2023-1829}\n- xen/netfront: fix leaking data in shared pages {CVE-2022-33740}\n- can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path {CVE-2022-28390}\n- xen/blkfront: fix leaking data in shared pages {CVE-2022-26365}\n- mISDN: fix use-after-free bugs in l1oip timer handlers {CVE-2022-3565}\n- drm/vgem: Close use-after-free race in vgem_gem_create {CVE-2022-1419}\n- cfg80211: call cfg80211_stop_ap when switch from P2P_GO type {CVE-2021-47194}\n- net: fix use-after-free in tw_timer_handler {CVE-2021-46936}\n- ext4: fix race writing to an inline_data file while its xattrs are changing {CVE-2021-40490}\n- virtio_console: Assure used length from device is limited {CVE-2021-38160}\n- pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() {CVE-2021-4157}\n- Bluetooth: sco: Fix lock_sock() blockage by memcpy_from_msg() {CVE-2021-3640}\n- Input: joydev - prevent use of not validated data in JSIOCSBTNMAP ioctl {CVE-2021-3612}\n- Input: joydev - prevent potential read overflow in ioctl {CVE-2021-3612}\n- can: bcm: delay release of struct bcm_op after synchronize_rcu() {CVE-2021-3609}\n- vt: keyboard: avoid signed integer overflow in k_ascii {CVE-2020-13974}\n- i2c: Fix a potential use after free {CVE-2019-25162}\n- drivers: net: slip: fix NPD bug in sl_tx_timeout() {CVE-2022-41858}\n- Bluetooth: L2CAP: Fix u8 overflow {CVE-2022-45934}\n- btrfs: unset reloc control if transaction commit fails in prepare_to_relocate() {CVE-2023-3111}\n- memstick: r592: Fix UAF bug in r592_remove due to race condition {CVE-2023-3141}\n- media: rc: Fix use-after-free bugs caused by ene_tx_irqsim() {CVE-2023-1118}\n- vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF {CVE-2023-3567}\n- Bluetooth: L2CAP: Fix use-after-free in l2cap_sock_ready_cb {CVE-2023-40283}\n- wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies() {CVE-2023-1380}\n- tcp: Fix data races around icsk->icsk_af_ops. {CVE-2022-3566}\n- staging: rtl8712: fix use after free bugs {CVE-2022-4095}\n- ext4: fix kernel infoleak via ext4_extent_header {CVE-2022-0850}\n- af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register {CVE-2022-1353}\n- misc: sgi-gru: fix use-after-free error in gru_set_context_option, gru_fault and gru_handle_user_call_os {CVE-2022-3424}\n- x86/elf: Disable automatic READ_IMPLIES_EXEC on 64-bit {CVE-2022-25265}\n- x86/elf: Split READ_IMPLIES_EXEC from executable PT_GNU_STACK {CVE-2022-25265}\n- x86/elf: Add table to document READ_IMPLIES_EXEC {CVE-2022-25265}\n- ipv6: use prandom_u32() for ID generation {CVE-2021-45485}\n- bpf: Fix integer overflow in prealloc_elems_and_freelist() {CVE-2021-41864}\n- ipv4: make exception cache less predictible {CVE-2021-20322}\n- ipv4: use siphash instead of Jenkins in fnhe_hashfun() {CVE-2021-20322}\n- net: vmxnet3: fix possible use-after-free bugs in vmxnet3_rq_alloc_rx_buf() {CVE-2023-4387}\n- netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one {CVE-2023-39197}\n- ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet {CVE-2023-6932}\n- smb: client: fix potential OOB in smb2_dump_detail() {CVE-2023-6610}\n- smb: client: fix OOB in smbCalcSize() {CVE-2023-6606}\n- atm: Fix Use-After-Free in do_vcc_ioctl {CVE-2023-51780}\n- drm/amdgpu: Fix potential fence use-after-free v2 {CVE-2023-51042}\n- sched/rt: pick_next_rt_entity(): check list_entry {CVE-2023-1077}\n- ath9k: fix use-after-free in ath9k_hif_usb_rx_cb {CVE-2022-1679}\n- net: prevent mss overflow in skb_segment() {CVE-2023-52435}\n- drm/atomic: Fix potential use-after-free in nonblocking commits {CVE-2023-42753}\n- debug: Lock down kgdb {CVE-2022-21499}",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/centos7els/advisories/2024/clsa-2024_1720468480.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-05-05T11:23:07Z",
      "generator": {
        "date": "2026-05-05T11:23:07Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2024:1720468480",
      "initial_release_date": "2024-07-08T15:54:42Z",
      "revision_history": [
        {
          "date": "2024-07-08T15:54:42Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-05-05T11:23:07Z",
          "number": "2",
          "summary": "Official Publication"
        }
      ],
      "status": "final",
      "version": "2"
    },
    "title": "kernel: Fix of 89 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Community Enterprise Operating System 7",
                "product": {
                  "name": "Community Enterprise Operating System 7",
                  "product_id": "CentOS-7",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:centos:centos:7:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Community Enterprise Operating System"
          }
        ],
        "category": "vendor",
        "name": "Red Hat, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                "product": {
                  "name": "kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                  "product_id": "kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-headers@3.10.0-1160.119.1.el7.tuxcare.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                "product": {
                  "name": "kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                  "product_id": "kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug@3.10.0-1160.119.1.el7.tuxcare.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                "product": {
                  "name": "kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                  "product_id": "kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-devel@3.10.0-1160.119.1.el7.tuxcare.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                "product": {
                  "name": "kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                  "product_id": "kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-tools@3.10.0-1160.119.1.el7.tuxcare.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                  "product_id": "kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug-devel@3.10.0-1160.119.1.el7.tuxcare.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                "product": {
                  "name": "python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                  "product_id": "python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/python-perf@3.10.0-1160.119.1.el7.tuxcare.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                "product": {
                  "name": "perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                  "product_id": "perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/perf@3.10.0-1160.119.1.el7.tuxcare.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                "product": {
                  "name": "bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                  "product_id": "bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/bpftool@3.10.0-1160.119.1.el7.tuxcare.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-tools-libs-devel@3.10.0-1160.119.1.el7.tuxcare.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                "product": {
                  "name": "kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                  "product_id": "kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel@3.10.0-1160.119.1.el7.tuxcare.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                  "product_id": "kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-tools-libs@3.10.0-1160.119.1.el7.tuxcare.els1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        },
        "product_reference": "kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        },
        "product_reference": "kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        },
        "product_reference": "kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        },
        "product_reference": "kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        },
        "product_reference": "python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        },
        "product_reference": "perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        },
        "product_reference": "bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        },
        "product_reference": "kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
        "relates_to_product_reference": "CentOS-7"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64 as a component of Community Enterprise Operating System 7",
          "product_id": "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
        "relates_to_product_reference": "CentOS-7"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-41864",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel before 5.14.12 allows unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-41864"
        },
        {
          "category": "external",
          "summary": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.12",
          "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.12"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=30e29a9a2bc6a4888335a6ede968b75cd329657a",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=30e29a9a2bc6a4888335a6ede968b75cd329657a"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a",
          "url": "https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20211029-0004/",
          "url": "https://security.netapp.com/advisory/ntap-20211029-0004/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2022/dsa-5096",
          "url": "https://www.debian.org/security/2022/dsa-5096"
        }
      ],
      "release_date": "2021-10-02T00:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-4149",
      "cwe": {
        "id": "CWE-667",
        "name": "Improper Locking"
      },
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in btrfs_alloc_tree_b in fs/btrfs/extent-tree.c in the Linux kernel due to an improper lock operation in btrfs. In this flaw, a user with a local privilege may cause a denial of service (DOS) due to a deadlock problem.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-4149"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2026485",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026485"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
        },
        {
          "category": "external",
          "summary": "https://lkml.org/lkml/2021/10/18/885",
          "url": "https://lkml.org/lkml/2021/10/18/885"
        },
        {
          "category": "external",
          "summary": "https://lkml.org/lkml/2021/9/13/2565",
          "url": "https://lkml.org/lkml/2021/9/13/2565"
        }
      ],
      "release_date": "2022-03-23T20:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2021-47118",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npid: take a reference when initializing `cad_pid`\n\nDuring boot, kernel_init_freeable() initializes `cad_pid` to the init\ntask's struct pid.  Later on, we may change `cad_pid` via a sysctl, and\nwhen this happens proc_do_cad_pid() will increment the refcount on the\nnew pid via get_pid(), and will decrement the refcount on the old pid\nvia put_pid().  As we never called get_pid() when we initialized\n`cad_pid`, we decrement a reference we never incremented, can therefore\nfree the init task's struct pid early.  As there can be dangling\nreferences to the struct pid, we can later encounter a use-after-free\n(e.g.  when delivering signals).\n\nThis was spotted when fuzzing v5.13-rc3 with Syzkaller, but seems to\nhave been around since the conversion of `cad_pid` to struct pid in\ncommit 9ec52099e4b8 (\"[PATCH] replace cad_pid by a struct pid\") from the\npre-KASAN stone age of v2.6.19.\n\nFix this by getting a reference to the init task's struct pid when we\nassign it to `cad_pid`.\n\nFull KASAN splat below.\n\n   ==================================================================\n   BUG: KASAN: use-after-free in ns_of_pid include/linux/pid.h:153 [inline]\n   BUG: KASAN: use-after-free in task_active_pid_ns+0xc0/0xc8 kernel/pid.c:509\n   Read of size 4 at addr ffff23794dda0004 by task syz-executor.0/273\n\n   CPU: 1 PID: 273 Comm: syz-executor.0 Not tainted 5.12.0-00001-g9aef892b2d15 #1\n   Hardware name: linux,dummy-virt (DT)\n   Call trace:\n    ns_of_pid include/linux/pid.h:153 [inline]\n    task_active_pid_ns+0xc0/0xc8 kernel/pid.c:509\n    do_notify_parent+0x308/0xe60 kernel/signal.c:1950\n    exit_notify kernel/exit.c:682 [inline]\n    do_exit+0x2334/0x2bd0 kernel/exit.c:845\n    do_group_exit+0x108/0x2c8 kernel/exit.c:922\n    get_signal+0x4e4/0x2a88 kernel/signal.c:2781\n    do_signal arch/arm64/kernel/signal.c:882 [inline]\n    do_notify_resume+0x300/0x970 arch/arm64/kernel/signal.c:936\n    work_pending+0xc/0x2dc\n\n   Allocated by task 0:\n    slab_post_alloc_hook+0x50/0x5c0 mm/slab.h:516\n    slab_alloc_node mm/slub.c:2907 [inline]\n    slab_alloc mm/slub.c:2915 [inline]\n    kmem_cache_alloc+0x1f4/0x4c0 mm/slub.c:2920\n    alloc_pid+0xdc/0xc00 kernel/pid.c:180\n    copy_process+0x2794/0x5e18 kernel/fork.c:2129\n    kernel_clone+0x194/0x13c8 kernel/fork.c:2500\n    kernel_thread+0xd4/0x110 kernel/fork.c:2552\n    rest_init+0x44/0x4a0 init/main.c:687\n    arch_call_rest_init+0x1c/0x28\n    start_kernel+0x520/0x554 init/main.c:1064\n    0x0\n\n   Freed by task 270:\n    slab_free_hook mm/slub.c:1562 [inline]\n    slab_free_freelist_hook+0x98/0x260 mm/slub.c:1600\n    slab_free mm/slub.c:3161 [inline]\n    kmem_cache_free+0x224/0x8e0 mm/slub.c:3177\n    put_pid.part.4+0xe0/0x1a8 kernel/pid.c:114\n    put_pid+0x30/0x48 kernel/pid.c:109\n    proc_do_cad_pid+0x190/0x1b0 kernel/sysctl.c:1401\n    proc_sys_call_handler+0x338/0x4b0 fs/proc/proc_sysctl.c:591\n    proc_sys_write+0x34/0x48 fs/proc/proc_sysctl.c:617\n    call_write_iter include/linux/fs.h:1977 [inline]\n    new_sync_write+0x3ac/0x510 fs/read_write.c:518\n    vfs_write fs/read_write.c:605 [inline]\n    vfs_write+0x9c4/0x1018 fs/read_write.c:585\n    ksys_write+0x124/0x240 fs/read_write.c:658\n    __do_sys_write fs/read_write.c:670 [inline]\n    __se_sys_write fs/read_write.c:667 [inline]\n    __arm64_sys_write+0x78/0xb0 fs/read_write.c:667\n    __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline]\n    invoke_syscall arch/arm64/kernel/syscall.c:49 [inline]\n    el0_svc_common.constprop.1+0x16c/0x388 arch/arm64/kernel/syscall.c:129\n    do_el0_svc+0xf8/0x150 arch/arm64/kernel/syscall.c:168\n    el0_svc+0x28/0x38 arch/arm64/kernel/entry-common.c:416\n    el0_sync_handler+0x134/0x180 arch/arm64/kernel/entry-common.c:432\n    el0_sync+0x154/0x180 arch/arm64/kernel/entry.S:701\n\n   The buggy address belongs to the object at ffff23794dda0000\n    which belongs to the cache pid of size 224\n   The buggy address is located 4 bytes inside of\n    224-byte region [ff\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-47118"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0711f0d7050b9e07c44bc159bbc64ac0a1022c7f",
          "url": "https://git.kernel.org/stable/c/0711f0d7050b9e07c44bc159bbc64ac0a1022c7f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2cd6eedfa6344f5ef5c3dac3aee57a39b5b46dff",
          "url": "https://git.kernel.org/stable/c/2cd6eedfa6344f5ef5c3dac3aee57a39b5b46dff"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4dbd8808a591b49b717862e6e0081bcf14a87788",
          "url": "https://git.kernel.org/stable/c/4dbd8808a591b49b717862e6e0081bcf14a87788"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7178be006d495ffb741c329012da289b62dddfe6",
          "url": "https://git.kernel.org/stable/c/7178be006d495ffb741c329012da289b62dddfe6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/764c2e892d1fe895392aff62fb353fdce43bb529",
          "url": "https://git.kernel.org/stable/c/764c2e892d1fe895392aff62fb353fdce43bb529"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b8ff869f20152fbe66b6c2e2715d26a2f9897cca",
          "url": "https://git.kernel.org/stable/c/b8ff869f20152fbe66b6c2e2715d26a2f9897cca"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d106f05432e60f9f62d456ef017687f5c73cb414",
          "url": "https://git.kernel.org/stable/c/d106f05432e60f9f62d456ef017687f5c73cb414"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f86c80515a8a3703e0ca2e56deb50fc2879c5ea4",
          "url": "https://git.kernel.org/stable/c/f86c80515a8a3703e0ca2e56deb50fc2879c5ea4"
        }
      ],
      "release_date": "2024-03-15T21:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-1419",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "The root cause of this vulnerability is that the ioctl$DRM_IOCTL_MODE_DESTROY_DUMB can decrease refcount of *drm_vgem_gem_object *(created in *vgem_gem_dumb_create*) concurrently, and *vgem_gem_dumb_create *will access the freed drm_vgem_gem_object.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-1419"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2077560",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077560"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2022/dsa-5173",
          "url": "https://www.debian.org/security/2022/dsa-5173"
        }
      ],
      "release_date": "2022-06-02T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-43389",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-43389"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2021/11/05/1",
          "url": "http://www.openwall.com/lists/oss-security/2021/11/05/1"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
        },
        {
          "category": "external",
          "summary": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15",
          "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA%40mail.gmail.com/",
          "url": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA%40mail.gmail.com/"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/oss-sec/2021/q4/39",
          "url": "https://seclists.org/oss-sec/2021/q4/39"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2022/dsa-5096",
          "url": "https://www.debian.org/security/2022/dsa-5096"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujul2022.html",
          "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
        }
      ],
      "release_date": "2021-11-04T19:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2021-30178",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in the Linux kernel through 5.11.11. synic_get in arch/x86/kvm/hyperv.c has a NULL pointer dereference for certain accesses to the SynIC Hyper-V context, aka CID-919f4ebc5987.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-30178"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=919f4ebc598701670e80e31573a58f1f2d2bf918",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=919f4ebc598701670e80e31573a58f1f2d2bf918"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IJ5GEETMX3ERQ4DF3GSS2XPNSOOK44OB/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IJ5GEETMX3ERQ4DF3GSS2XPNSOOK44OB/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TGQDVYCDM3F5VXUZIADIV2ERL3AJXNJS/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TGQDVYCDM3F5VXUZIADIV2ERL3AJXNJS/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5YFGIIF24475A2LNW3UWHW2SNCS3G7M/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5YFGIIF24475A2LNW3UWHW2SNCS3G7M/"
        }
      ],
      "release_date": "2021-04-07T00:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2023-6606",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-6606"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0723",
          "url": "https://access.redhat.com/errata/RHSA-2024:0723"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0725",
          "url": "https://access.redhat.com/errata/RHSA-2024:0725"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0881",
          "url": "https://access.redhat.com/errata/RHSA-2024:0881"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0897",
          "url": "https://access.redhat.com/errata/RHSA-2024:0897"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:1188",
          "url": "https://access.redhat.com/errata/RHSA-2024:1188"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:1248",
          "url": "https://access.redhat.com/errata/RHSA-2024:1248"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:1404",
          "url": "https://access.redhat.com/errata/RHSA-2024:1404"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:2094",
          "url": "https://access.redhat.com/errata/RHSA-2024:2094"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2023-6606",
          "url": "https://access.redhat.com/security/cve/CVE-2023-6606"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.kernel.org/show_bug.cgi?id=218218",
          "url": "https://bugzilla.kernel.org/show_bug.cgi?id=218218"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2253611",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253611"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html"
        }
      ],
      "release_date": "2023-12-08T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-21499",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-21499"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html",
          "url": "http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/linus/eadb2f47a3ced5c64b23b90fd2a3463f63726066",
          "url": "https://git.kernel.org/linus/eadb2f47a3ced5c64b23b90fd2a3463f63726066"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2022/dsa-5161",
          "url": "https://www.debian.org/security/2022/dsa-5161"
        }
      ],
      "release_date": "2022-06-09T21:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2023-4623",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-4623"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html",
          "url": "http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f"
        },
        {
          "category": "external",
          "summary": "https://kernel.dance/b3d26c5702c7d6c45456326e56d2ccf3f103e60f",
          "url": "https://kernel.dance/b3d26c5702c7d6c45456326e56d2ccf3f103e60f"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"
        }
      ],
      "release_date": "2023-09-06T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-6931",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escalation.\n\nA perf_event's read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\n\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-6931"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=382c27f4ed28f803b1f1473ac2d8db0afc795a1b",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=382c27f4ed28f803b1f1473ac2d8db0afc795a1b"
        },
        {
          "category": "external",
          "summary": "https://kernel.dance/382c27f4ed28f803b1f1473ac2d8db0afc795a1b",
          "url": "https://kernel.dance/382c27f4ed28f803b1f1473ac2d8db0afc795a1b"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html"
        }
      ],
      "release_date": "2023-12-19T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-6932",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation.\n\nA race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.\n\nWe recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-6932"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html",
          "url": "http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=e2b706c691905fe78468c361aaabc719d0a496f1",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=e2b706c691905fe78468c361aaabc719d0a496f1"
        },
        {
          "category": "external",
          "summary": "https://kernel.dance/e2b706c691905fe78468c361aaabc719d0a496f1",
          "url": "https://kernel.dance/e2b706c691905fe78468c361aaabc719d0a496f1"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html"
        }
      ],
      "release_date": "2023-12-19T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-52752",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix use-after-free bug in cifs_debug_data_proc_show()\n\nSkip SMB sessions that are being teared down\n(e.g. @ses->ses_status == SES_EXITING) in cifs_debug_data_proc_show()\nto avoid use-after-free in @ses.\n\nThis fixes the following GPF when reading from /proc/fs/cifs/DebugData\nwhile mounting and umounting\n\n  [ 816.251274] general protection fault, probably for non-canonical\n  address 0x6b6b6b6b6b6b6d81: 0000 [#1] PREEMPT SMP NOPTI\n  ...\n  [  816.260138] Call Trace:\n  [  816.260329]  <TASK>\n  [  816.260499]  ? die_addr+0x36/0x90\n  [  816.260762]  ? exc_general_protection+0x1b3/0x410\n  [  816.261126]  ? asm_exc_general_protection+0x26/0x30\n  [  816.261502]  ? cifs_debug_tcon+0xbd/0x240 [cifs]\n  [  816.261878]  ? cifs_debug_tcon+0xab/0x240 [cifs]\n  [  816.262249]  cifs_debug_data_proc_show+0x516/0xdb0 [cifs]\n  [  816.262689]  ? seq_read_iter+0x379/0x470\n  [  816.262995]  seq_read_iter+0x118/0x470\n  [  816.263291]  proc_reg_read_iter+0x53/0x90\n  [  816.263596]  ? srso_alias_return_thunk+0x5/0x7f\n  [  816.263945]  vfs_read+0x201/0x350\n  [  816.264211]  ksys_read+0x75/0x100\n  [  816.264472]  do_syscall_64+0x3f/0x90\n  [  816.264750]  entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n  [  816.265135] RIP: 0033:0x7fd5e669d381",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-52752"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0ab6f842452ce2cae04209d4671ac6289d0aef8a",
          "url": "https://git.kernel.org/stable/c/0ab6f842452ce2cae04209d4671ac6289d0aef8a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2abdf136784b7edaec7ffe0f4b461b63f9c4c4de",
          "url": "https://git.kernel.org/stable/c/2abdf136784b7edaec7ffe0f4b461b63f9c4c4de"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/336a066990bb3962c46daf574ace596bda9303ce",
          "url": "https://git.kernel.org/stable/c/336a066990bb3962c46daf574ace596bda9303ce"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/558817597d5fbd7af31f891b67b0fd20f0d047b7",
          "url": "https://git.kernel.org/stable/c/558817597d5fbd7af31f891b67b0fd20f0d047b7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/89929ea46f9cc11ba66d2c64713aa5d5dc723b09",
          "url": "https://git.kernel.org/stable/c/89929ea46f9cc11ba66d2c64713aa5d5dc723b09"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d328c09ee9f15ee5a26431f5aad7c9239fa85e62",
          "url": "https://git.kernel.org/stable/c/d328c09ee9f15ee5a26431f5aad7c9239fa85e62"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        }
      ],
      "release_date": "2024-05-21T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-35824",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in the Linux kernel before 6.3.2. A use-after-free was found in dm1105_remove in drivers/media/pci/dm1105/dm1105.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-35824"
        },
        {
          "category": "external",
          "summary": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2",
          "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5abda7a16698d4d1f47af1168d8fa2c640116b4a",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5abda7a16698d4d1f47af1168d8fa2c640116b4a"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/all/49bb0b6a-e669-d4e7-d742-a19d2763e947%40xs4all.nl/",
          "url": "https://lore.kernel.org/all/49bb0b6a-e669-d4e7-d742-a19d2763e947%40xs4all.nl/"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/lkml/20230318081506.795147-1-zyytlz.wz%40163.com/",
          "url": "https://lore.kernel.org/lkml/20230318081506.795147-1-zyytlz.wz%40163.com/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230803-0002/",
          "url": "https://security.netapp.com/advisory/ntap-20230803-0002/"
        }
      ],
      "release_date": "2023-06-18T22:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-2124",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-2124"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/xfs/xfs_buf_item_recover.c?h=v6.4-rc1&id=22ed903eee23a5b174e240f1cdfa9acf393a5210",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/xfs/xfs_buf_item_recover.c?h=v6.4-rc1&id=22ed903eee23a5b174e240f1cdfa9acf393a5210"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230622-0010/",
          "url": "https://security.netapp.com/advisory/ntap-20230622-0010/"
        },
        {
          "category": "external",
          "summary": "https://syzkaller.appspot.com/bug?extid=7e9494b8b399902e994e",
          "url": "https://syzkaller.appspot.com/bug?extid=7e9494b8b399902e994e"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5448",
          "url": "https://www.debian.org/security/2023/dsa-5448"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5480",
          "url": "https://www.debian.org/security/2023/dsa-5480"
        }
      ],
      "release_date": "2023-05-15T22:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-37159",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-37159"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.suse.com/show_bug.cgi?id=1188601",
          "url": "https://bugzilla.suse.com/show_bug.cgi?id=1188601"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a6ecfb39ba9d7316057cea823b196b734f6b18ca",
          "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a6ecfb39ba9d7316057cea823b196b734f6b18ca"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dcb713d53e2eadf42b878c12a471e74dc6ed3145",
          "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dcb713d53e2eadf42b878c12a471e74dc6ed3145"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20210819-0003/",
          "url": "https://security.netapp.com/advisory/ntap-20210819-0003/"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujul2022.html",
          "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
        },
        {
          "category": "external",
          "summary": "https://www.spinics.net/lists/linux-usb/msg202228.html",
          "url": "https://www.spinics.net/lists/linux-usb/msg202228.html"
        }
      ],
      "release_date": "2021-07-21T15:16:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2021-3609",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
      },
      "notes": [
        {
          "category": "description",
          "text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-3609"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971651"
        },
        {
          "category": "external",
          "summary": "https://github.com/nrb547/kernel-exploitation/blob/main/cve-2021-3609/cve-2021-3609.md",
          "url": "https://github.com/nrb547/kernel-exploitation/blob/main/cve-2021-3609/cve-2021-3609.md"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/d5f9023fa61ee8b94f37a93f08e94b136cf1e463",
          "url": "https://github.com/torvalds/linux/commit/d5f9023fa61ee8b94f37a93f08e94b136cf1e463"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20220419-0004/",
          "url": "https://security.netapp.com/advisory/ntap-20220419-0004/"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/06/19/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/06/19/1"
        }
      ],
      "release_date": "2022-03-03T19:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-20321",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
      },
      "notes": [
        {
          "category": "description",
          "text": "A race condition accessing file object in the Linux kernel OverlayFS subsystem was found in the way users do rename in specific way with OverlayFS. A local user could use this flaw to crash the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-20321"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2013242",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013242"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/all/20211011134508.748956131%40linuxfoundation.org/",
          "url": "https://lore.kernel.org/all/20211011134508.748956131%40linuxfoundation.org/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2022/dsa-5096",
          "url": "https://www.debian.org/security/2022/dsa-5096"
        }
      ],
      "release_date": "2022-02-18T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2022-1011",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-1011"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/mszeredi/fuse.git/commit/?h=for-next",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/mszeredi/fuse.git/commit/?h=for-next"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2022/dsa-5173",
          "url": "https://www.debian.org/security/2022/dsa-5173"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujul2022.html",
          "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
        }
      ],
      "release_date": "2022-03-18T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-3565",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-3565"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=2568a7e0832ee30b0a351016d03062ab4e0e0a3f",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=2568a7e0832ee30b0a351016d03062ab4e0e0a3f"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?id.211088",
          "url": "https://vuldb.com/?id.211088"
        }
      ],
      "release_date": "2022-10-17T19:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-20292",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "There is a flaw reported in the Linux kernel in versions before 5.9 in drivers/gpu/drm/nouveau/nouveau_sgdma.c in nouveau_sgdma_create_ttm in Nouveau DRM subsystem. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker with a local account with a root privilege, can leverage this vulnerability to escalate privileges and execute code in the context of the kernel.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-20292"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=1939686",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939686"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
        }
      ],
      "release_date": "2021-05-28T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2023-51042",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel before 6.4.12, amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c has a fence use-after-free.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-51042"
        },
        {
          "category": "external",
          "summary": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12",
          "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/2e54154b9f27262efd0cb4f903cc7d5ad1fe9628",
          "url": "https://github.com/torvalds/linux/commit/2e54154b9f27262efd0cb4f903cc7d5ad1fe9628"
        }
      ],
      "release_date": "2024-01-23T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-47194",
      "cwe": {
        "id": "CWE-665",
        "name": "Improper Initialization"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncfg80211: call cfg80211_stop_ap when switch from P2P_GO type\n\nIf the userspace tools switch from NL80211_IFTYPE_P2P_GO to\nNL80211_IFTYPE_ADHOC via send_msg(NL80211_CMD_SET_INTERFACE), it\ndoes not call the cleanup cfg80211_stop_ap(), this leads to the\ninitialization of in-use data. For example, this path re-init the\nsdata->assigned_chanctx_list while it is still an element of\nassigned_vifs list, and makes that linked list corrupt.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-47194"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0738cdb636c21ab552eaecf905efa4a6070e3ebc",
          "url": "https://git.kernel.org/stable/c/0738cdb636c21ab552eaecf905efa4a6070e3ebc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4e458abbb4a523f1413bfe15c079cf4e24c15b21",
          "url": "https://git.kernel.org/stable/c/4e458abbb4a523f1413bfe15c079cf4e24c15b21"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/52affc201fc22a1ab9a59ef0ed641a9adfcb8d13",
          "url": "https://git.kernel.org/stable/c/52affc201fc22a1ab9a59ef0ed641a9adfcb8d13"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/563fbefed46ae4c1f70cffb8eb54c02df480b2c2",
          "url": "https://git.kernel.org/stable/c/563fbefed46ae4c1f70cffb8eb54c02df480b2c2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5a9b671c8d74a3e1b999e7a0c7f366079bcc93dd",
          "url": "https://git.kernel.org/stable/c/5a9b671c8d74a3e1b999e7a0c7f366079bcc93dd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7b97b5776daa0b39dbdadfea176f9cc0646d4a66",
          "url": "https://git.kernel.org/stable/c/7b97b5776daa0b39dbdadfea176f9cc0646d4a66"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8f06bb8c216bcd172394f61e557727e691b4cb24",
          "url": "https://git.kernel.org/stable/c/8f06bb8c216bcd172394f61e557727e691b4cb24"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b8a045e2a9b234cfbc06cf36923886164358ddec",
          "url": "https://git.kernel.org/stable/c/b8a045e2a9b234cfbc06cf36923886164358ddec"
        }
      ],
      "release_date": "2024-04-10T19:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-3679",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "description",
          "text": "A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-3679"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f0d6d9883c13174669f88adac4f0ee656cc16a",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=67f0d6d9883c13174669f88adac4f0ee656cc16a"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2021/dsa-4978",
          "url": "https://www.debian.org/security/2021/dsa-4978"
        }
      ],
      "release_date": "2021-08-05T20:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2022-1016",
      "cwe": {
        "id": "CWE-824",
        "name": "Access of Uninitialized Pointer"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-1016"
        },
        {
          "category": "external",
          "summary": "http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/",
          "url": "http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2022-1016",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1016"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2066614",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066614"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/oss-sec/2022/q1/205",
          "url": "https://seclists.org/oss-sec/2022/q1/205"
        }
      ],
      "release_date": "2022-08-29T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2023-4387",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in vmxnet3_rq_alloc_rx_buf in drivers/net/vmxnet3/vmxnet3_drv.c in VMware's vmxnet3 ethernet NIC driver in the Linux Kernel. This issue could allow a local attacker to crash the system due to a double-free while cleaning up vmxnet3_rq_cleanup_all, which could also lead to a kernel information leak problem.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-4387"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2022:7683",
          "url": "https://access.redhat.com/errata/RHSA-2022:7683"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2022:8267",
          "url": "https://access.redhat.com/errata/RHSA-2022:8267"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2023-4387",
          "url": "https://access.redhat.com/security/cve/CVE-2023-4387"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2219270",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219270"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/9e7fef9521e73ca8afd7da9e58c14654b02dfad8",
          "url": "https://github.com/torvalds/linux/commit/9e7fef9521e73ca8afd7da9e58c14654b02dfad8"
        }
      ],
      "release_date": "2023-08-16T19:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-28971",
      "cwe": {
        "id": "CWE-755",
        "name": "Improper Handling of Exceptional Conditions"
      },
      "notes": [
        {
          "category": "description",
          "text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-28971"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d88d05a9e0b6d9356e97129d4ff9942d765f46ea",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d88d05a9e0b6d9356e97129d4ff9942d765f46ea"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20210430-0003/",
          "url": "https://security.netapp.com/advisory/ntap-20210430-0003/"
        }
      ],
      "release_date": "2021-03-22T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2021-28964",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
      },
      "notes": [
        {
          "category": "description",
          "text": "A race condition was discovered in get_old_root in fs/btrfs/ctree.c in the Linux kernel through 5.11.8. It allows attackers to cause a denial of service (BUG) because of a lack of locking on an extent buffer before a cloning operation, aka CID-dbcc7d57bffc.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-28964"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbcc7d57bffc0c8cac9dac11bec548597d59a6a5",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbcc7d57bffc0c8cac9dac11bec548597d59a6a5"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20210430-0003/",
          "url": "https://security.netapp.com/advisory/ntap-20210430-0003/"
        }
      ],
      "release_date": "2021-03-22T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 1.9,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2023-1077",
      "cwe": {
        "id": "CWE-843",
        "name": "Access of Resource Using Incompatible Type ('Type Confusion')"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-1077"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=7c4a5b89a0b5a57a64b601775b296abf77a9fe97",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=7c4a5b89a0b5a57a64b601775b296abf77a9fe97"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230511-0002/",
          "url": "https://security.netapp.com/advisory/ntap-20230511-0002/"
        }
      ],
      "release_date": "2023-03-27T21:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-42753",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h->nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-42753"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:7370",
          "url": "https://access.redhat.com/errata/RHSA-2023:7370"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:7379",
          "url": "https://access.redhat.com/errata/RHSA-2023:7379"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:7382",
          "url": "https://access.redhat.com/errata/RHSA-2023:7382"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:7389",
          "url": "https://access.redhat.com/errata/RHSA-2023:7389"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:7411",
          "url": "https://access.redhat.com/errata/RHSA-2023:7411"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:7418",
          "url": "https://access.redhat.com/errata/RHSA-2023:7418"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:7539",
          "url": "https://access.redhat.com/errata/RHSA-2023:7539"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:7558",
          "url": "https://access.redhat.com/errata/RHSA-2023:7558"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0089",
          "url": "https://access.redhat.com/errata/RHSA-2024:0089"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0113",
          "url": "https://access.redhat.com/errata/RHSA-2024:0113"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0134",
          "url": "https://access.redhat.com/errata/RHSA-2024:0134"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0340",
          "url": "https://access.redhat.com/errata/RHSA-2024:0340"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0346",
          "url": "https://access.redhat.com/errata/RHSA-2024:0346"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0347",
          "url": "https://access.redhat.com/errata/RHSA-2024:0347"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0371",
          "url": "https://access.redhat.com/errata/RHSA-2024:0371"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0376",
          "url": "https://access.redhat.com/errata/RHSA-2024:0376"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0378",
          "url": "https://access.redhat.com/errata/RHSA-2024:0378"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0402",
          "url": "https://access.redhat.com/errata/RHSA-2024:0402"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0403",
          "url": "https://access.redhat.com/errata/RHSA-2024:0403"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0412",
          "url": "https://access.redhat.com/errata/RHSA-2024:0412"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0461",
          "url": "https://access.redhat.com/errata/RHSA-2024:0461"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0562",
          "url": "https://access.redhat.com/errata/RHSA-2024:0562"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0563",
          "url": "https://access.redhat.com/errata/RHSA-2024:0563"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0593",
          "url": "https://access.redhat.com/errata/RHSA-2024:0593"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0999",
          "url": "https://access.redhat.com/errata/RHSA-2024:0999"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2023-42753",
          "url": "https://access.redhat.com/security/cve/CVE-2023-42753"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2239843",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239843"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/oss-sec/2023/q3/216",
          "url": "https://seclists.org/oss-sec/2023/q3/216"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html",
          "url": "http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2023/09/22/10",
          "url": "https://www.openwall.com/lists/oss-security/2023/09/22/10"
        }
      ],
      "release_date": "2023-09-25T21:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-46906",
      "cwe": {
        "id": "CWE-668",
        "name": "Exposure of Resource to Wrong Sphere"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: usbhid: fix info leak in hid_submit_ctrl\n\nIn hid_submit_ctrl(), the way of calculating the report length doesn't\ntake into account that report->size can be zero. When running the\nsyzkaller reproducer, a report of size 0 causes hid_submit_ctrl) to\ncalculate transfer_buffer_length as 16384. When this urb is passed to\nthe usb core layer, KMSAN reports an info leak of 16384 bytes.\n\nTo fix this, first modify hid_report_len() to account for the zero\nreport size case by using DIV_ROUND_UP for the division. Then, call it\nfrom hid_submit_ctrl().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-46906"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82",
          "url": "https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8",
          "url": "https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce",
          "url": "https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f",
          "url": "https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1",
          "url": "https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0",
          "url": "https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9",
          "url": "https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366",
          "url": "https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366"
        }
      ],
      "release_date": "2024-02-26T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2023-1380",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info->req_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-1380"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html",
          "url": "http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html",
          "url": "http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2177883",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177883"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-wireless/20230309104457.22628-1-jisoo.jang%40yonsei.ac.kr/T/#u",
          "url": "https://lore.kernel.org/linux-wireless/20230309104457.22628-1-jisoo.jang%40yonsei.ac.kr/T/#u"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230511-0001/",
          "url": "https://security.netapp.com/advisory/ntap-20230511-0001/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5480",
          "url": "https://www.debian.org/security/2023/dsa-5480"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2023/03/14/1",
          "url": "https://www.openwall.com/lists/oss-security/2023/03/14/1"
        }
      ],
      "release_date": "2023-03-27T21:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-3659",
      "cwe": {
        "id": "CWE-252",
        "name": "Unchecked Return Value"
      },
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the Linux kernel’s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-3659"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2021-3659",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3659"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8"
        }
      ],
      "release_date": "2022-08-22T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2022-1679",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel’s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-1679"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/lkml/87ilqc7jv9.fsf%40kernel.org/t/",
          "url": "https://lore.kernel.org/lkml/87ilqc7jv9.fsf%40kernel.org/t/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20220629-0007/",
          "url": "https://security.netapp.com/advisory/ntap-20220629-0007/"
        }
      ],
      "release_date": "2022-05-16T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-3141",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-3141"
        },
        {
          "category": "external",
          "summary": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4",
          "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63264422785021704c39b38f65a78ab9e4a186d7",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63264422785021704c39b38f65a78ab9e4a186d7"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/lkml/CAPDyKFoV9aZObZ5GBm0U_-UVeVkBN_rAG-kH3BKoP4EXdYM4bw%40mail.gmail.com/t/",
          "url": "https://lore.kernel.org/lkml/CAPDyKFoV9aZObZ5GBm0U_-UVeVkBN_rAG-kH3BKoP4EXdYM4bw%40mail.gmail.com/t/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230706-0004/",
          "url": "https://security.netapp.com/advisory/ntap-20230706-0004/"
        }
      ],
      "release_date": "2023-06-09T20:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-39197",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds read vulnerability was found in Netfilter Connection Tracking (conntrack) in the Linux kernel. This flaw allows a remote user to disclose sensitive information via the DCCP protocol.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-39197"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2023-39197",
          "url": "https://access.redhat.com/security/cve/CVE-2023-39197"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2218342",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218342"
        }
      ],
      "release_date": "2024-01-23T03:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-52445",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: pvrusb2: fix use after free on context disconnection\n\nUpon module load, a kthread is created targeting the\npvr2_context_thread_func function, which may call pvr2_context_destroy\nand thus call kfree() on the context object. However, that might happen\nbefore the usb hub_event handler is able to notify the driver. This\npatch adds a sanity check before the invalid read reported by syzbot,\nwithin the context disconnection call stack.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-52445"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2cf0005d315549b8d2b940ff96a66c2a889aa795",
          "url": "https://git.kernel.org/stable/c/2cf0005d315549b8d2b940ff96a66c2a889aa795"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/30773ea47d41773f9611ffb4ebc9bda9d19a9e7e",
          "url": "https://git.kernel.org/stable/c/30773ea47d41773f9611ffb4ebc9bda9d19a9e7e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3233d8bf7893550045682192cb227af7fa3defeb",
          "url": "https://git.kernel.org/stable/c/3233d8bf7893550045682192cb227af7fa3defeb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/437b5f57732bb4cc32cc9f8895d2010ee9ff521c",
          "url": "https://git.kernel.org/stable/c/437b5f57732bb4cc32cc9f8895d2010ee9ff521c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/47aa8fcd5e8b5563af4042a00f25ba89bef8f33d",
          "url": "https://git.kernel.org/stable/c/47aa8fcd5e8b5563af4042a00f25ba89bef8f33d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ded85b0c0edd8f45fec88783d7555a5b982449c1",
          "url": "https://git.kernel.org/stable/c/ded85b0c0edd8f45fec88783d7555a5b982449c1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ec3634ebe23fc3c44ebc67c6d25917300bc68c08",
          "url": "https://git.kernel.org/stable/c/ec3634ebe23fc3c44ebc67c6d25917300bc68c08"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ec36c134dd020d28e312c2f1766f85525e747aab",
          "url": "https://git.kernel.org/stable/c/ec36c134dd020d28e312c2f1766f85525e747aab"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"
        }
      ],
      "release_date": "2024-02-22T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-31916",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-31916"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a",
          "url": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
        },
        {
          "category": "external",
          "summary": "https://seclists.org/oss-sec/2021/q1/268",
          "url": "https://seclists.org/oss-sec/2021/q1/268"
        }
      ],
      "release_date": "2021-05-06T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:C",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2020-13974",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2020-13974"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html",
          "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html"
        },
        {
          "category": "external",
          "summary": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html",
          "url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=dad0bf9ce93fa40b667eccd3306783f4db4b932b",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=dad0bf9ce93fa40b667eccd3306783f4db4b932b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html",
          "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html"
        },
        {
          "category": "external",
          "summary": "https://lkml.org/lkml/2020/3/22/482",
          "url": "https://lkml.org/lkml/2020/3/22/482"
        },
        {
          "category": "external",
          "summary": "https://usn.ubuntu.com/4427-1/",
          "url": "https://usn.ubuntu.com/4427-1/"
        },
        {
          "category": "external",
          "summary": "https://usn.ubuntu.com/4439-1/",
          "url": "https://usn.ubuntu.com/4439-1/"
        },
        {
          "category": "external",
          "summary": "https://usn.ubuntu.com/4440-1/",
          "url": "https://usn.ubuntu.com/4440-1/"
        },
        {
          "category": "external",
          "summary": "https://usn.ubuntu.com/4483-1/",
          "url": "https://usn.ubuntu.com/4483-1/"
        },
        {
          "category": "external",
          "summary": "https://usn.ubuntu.com/4485-1/",
          "url": "https://usn.ubuntu.com/4485-1/"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujul2022.html",
          "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
        }
      ],
      "release_date": "2020-06-09T05:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-33740",
      "cwe": {
        "id": "CWE-212",
        "name": "Improper Removal of Sensitive Information Before Storage or Transfer"
      },
      "notes": [
        {
          "category": "description",
          "text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-33740"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2022/07/05/6",
          "url": "http://www.openwall.com/lists/oss-security/2022/07/05/6"
        },
        {
          "category": "external",
          "summary": "http://xenbits.xen.org/xsa/advisory-403.html",
          "url": "http://xenbits.xen.org/xsa/advisory-403.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGFTRZ66KQYTSYIRT5FRHF5D6O72NWOP/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGFTRZ66KQYTSYIRT5FRHF5D6O72NWOP/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2022/dsa-5191",
          "url": "https://www.debian.org/security/2022/dsa-5191"
        },
        {
          "category": "external",
          "summary": "https://xenbits.xenproject.org/xsa/advisory-403.txt",
          "url": "https://xenbits.xenproject.org/xsa/advisory-403.txt"
        }
      ],
      "release_date": "2022-07-05T13:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.6,
            "baseSeverity": "LOW",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-4157",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "description",
          "text": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-4157"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/lkml/20210517140244.822185482%40linuxfoundation.org/",
          "url": "https://lore.kernel.org/lkml/20210517140244.822185482%40linuxfoundation.org/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20220602-0007/",
          "url": "https://security.netapp.com/advisory/ntap-20220602-0007/"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujul2022.html",
          "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
        }
      ],
      "release_date": "2022-03-25T19:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "SINGLE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2019-25162",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: Fix a potential use after free\n\nFree the adap structure only after we are done using it.\nThis patch just moves the put_device() down a bit to avoid the\nuse after free.\n\n[wsa: added comment to the code, added Fixes tag]",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2019-25162"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d",
          "url": "https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829",
          "url": "https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7",
          "url": "https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9",
          "url": "https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87",
          "url": "https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf",
          "url": "https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a",
          "url": "https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4",
          "url": "https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4"
        }
      ],
      "release_date": "2024-02-26T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-51780",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-51780"
        },
        {
          "category": "external",
          "summary": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.8",
          "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.8"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3",
          "url": "https://github.com/torvalds/linux/commit/24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20240419-0001/",
          "url": "https://security.netapp.com/advisory/ntap-20240419-0001/"
        }
      ],
      "release_date": "2024-01-11T19:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-38160",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')"
      },
      "notes": [
        {
          "category": "description",
          "text": "In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-38160"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/cve-2021-38160",
          "url": "https://access.redhat.com/security/cve/cve-2021-38160"
        },
        {
          "category": "external",
          "summary": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4",
          "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.4"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/d00d8da5869a2608e97cfede094dfc5e11462a46",
          "url": "https://github.com/torvalds/linux/commit/d00d8da5869a2608e97cfede094dfc5e11462a46"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20210902-0010/",
          "url": "https://security.netapp.com/advisory/ntap-20210902-0010/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2021/dsa-4978",
          "url": "https://www.debian.org/security/2021/dsa-4978"
        }
      ],
      "release_date": "2021-08-07T04:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-1652",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-1652"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=1832397",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832397"
        },
        {
          "category": "external",
          "summary": "https://francozappa.github.io/about-bias/",
          "url": "https://francozappa.github.io/about-bias/"
        },
        {
          "category": "external",
          "summary": "https://kb.cert.org/vuls/id/647177/",
          "url": "https://kb.cert.org/vuls/id/647177/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20220722-0002/",
          "url": "https://security.netapp.com/advisory/ntap-20220722-0002/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2022/dsa-5173",
          "url": "https://www.debian.org/security/2022/dsa-5173"
        }
      ],
      "release_date": "2022-06-02T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-45485",
      "cwe": {
        "id": "CWE-327",
        "name": "Use of a Broken or Risky Cryptographic Algorithm"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the IPv6 implementation in the Linux kernel before 5.13.3, net/ipv6/output_core.c has an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-45485"
        },
        {
          "category": "external",
          "summary": "https://arxiv.org/pdf/2112.09604.pdf",
          "url": "https://arxiv.org/pdf/2112.09604.pdf"
        },
        {
          "category": "external",
          "summary": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3",
          "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20220121-0001/",
          "url": "https://security.netapp.com/advisory/ntap-20220121-0001/"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujul2022.html",
          "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
        }
      ],
      "release_date": "2021-12-25T02:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-3629",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in Linux Kernel. It has been declared as problematic. This vulnerability affects the function vsock_connect of the file net/vmw_vsock/af_vsock.c. The manipulation leads to memory leak. The complexity of an attack is rather high. The exploitation appears to be difficult. It is recommended to apply a patch to fix this issue. VDB-211930 is the identifier assigned to this vulnerability.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-3629"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=7e97cfed9929eaabc41829c395eb0d1350fccb9d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/commit/?id=7e97cfed9929eaabc41829c395eb0d1350fccb9d"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?ctiid.211930",
          "url": "https://vuldb.com/?ctiid.211930"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?id.211930",
          "url": "https://vuldb.com/?id.211930"
        }
      ],
      "release_date": "2022-10-21T06:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ]
    },
    {
      "cve": "CVE-2021-20322",
      "cwe": {
        "id": "CWE-330",
        "name": "Use of Insufficiently Random Values"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-20322"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2014230",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014230"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=4785305c05b25a242e5314cc821f54ade4c18810",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=4785305c05b25a242e5314cc821f54ade4c18810"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=6457378fe796815c973f631a1904e147d6ee33b1",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=6457378fe796815c973f631a1904e147d6ee33b1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&id=67d6d681e15b578c1725bad8ad079e05d1c48a8e",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&id=67d6d681e15b578c1725bad8ad079e05d1c48a8e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&id=a00df2caffed3883c341d5685f830434312e4a43",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&id=a00df2caffed3883c341d5685f830434312e4a43"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20220303-0002/",
          "url": "https://security.netapp.com/advisory/ntap-20220303-0002/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2022/dsa-5096",
          "url": "https://www.debian.org/security/2022/dsa-5096"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujul2022.html",
          "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
        }
      ],
      "release_date": "2022-02-18T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-0850",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in linux kernel, where an information leak occurs via ext4_extent_header to userspace.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-0850"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2022-0850",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0850"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2060606",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060606"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe"
        },
        {
          "category": "external",
          "summary": "https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8",
          "url": "https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8"
        }
      ],
      "release_date": "2022-08-29T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-43975",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel through 5.15.2, hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allows an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-43975"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify%40kernel.org/T/",
          "url": "https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify%40kernel.org/T/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20211210-0001/",
          "url": "https://security.netapp.com/advisory/ntap-20211210-0001/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2022/dsa-5096",
          "url": "https://www.debian.org/security/2022/dsa-5096"
        }
      ],
      "release_date": "2021-11-17T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2022-33741",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "description",
          "text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-33741"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2022/07/05/6",
          "url": "http://www.openwall.com/lists/oss-security/2022/07/05/6"
        },
        {
          "category": "external",
          "summary": "http://xenbits.xen.org/xsa/advisory-403.html",
          "url": "http://xenbits.xen.org/xsa/advisory-403.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGFTRZ66KQYTSYIRT5FRHF5D6O72NWOP/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGFTRZ66KQYTSYIRT5FRHF5D6O72NWOP/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2022/dsa-5191",
          "url": "https://www.debian.org/security/2022/dsa-5191"
        },
        {
          "category": "external",
          "summary": "https://xenbits.xenproject.org/xsa/advisory-403.txt",
          "url": "https://xenbits.xenproject.org/xsa/advisory-403.txt"
        }
      ],
      "release_date": "2022-07-05T13:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.6,
            "baseSeverity": "LOW",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-3567",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-3567"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0412",
          "url": "https://access.redhat.com/errata/RHSA-2024:0412"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0431",
          "url": "https://access.redhat.com/errata/RHSA-2024:0431"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0432",
          "url": "https://access.redhat.com/errata/RHSA-2024:0432"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0439",
          "url": "https://access.redhat.com/errata/RHSA-2024:0439"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0448",
          "url": "https://access.redhat.com/errata/RHSA-2024:0448"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0575",
          "url": "https://access.redhat.com/errata/RHSA-2024:0575"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:2394",
          "url": "https://access.redhat.com/errata/RHSA-2024:2394"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:2950",
          "url": "https://access.redhat.com/errata/RHSA-2024:2950"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:3138",
          "url": "https://access.redhat.com/errata/RHSA-2024:3138"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2023-3567",
          "url": "https://access.redhat.com/security/cve/CVE-2023-3567"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2221463",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2221463"
        },
        {
          "category": "external",
          "summary": "https://www.spinics.net/lists/stable-commits/msg285184.html",
          "url": "https://www.spinics.net/lists/stable-commits/msg285184.html"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html",
          "url": "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html",
          "url": "http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html"
        }
      ],
      "release_date": "2023-07-24T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-28390",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-28390"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/c70222752228a62135cee3409dccefd494a24646",
          "url": "https://github.com/torvalds/linux/commit/c70222752228a62135cee3409dccefd494a24646"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20220513-0001/",
          "url": "https://security.netapp.com/advisory/ntap-20220513-0001/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2022/dsa-5127",
          "url": "https://www.debian.org/security/2022/dsa-5127"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2022/dsa-5173",
          "url": "https://www.debian.org/security/2022/dsa-5173"
        }
      ],
      "release_date": "2022-04-03T21:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-4159",
      "cwe": {
        "id": "CWE-202",
        "name": "Exposure of Sensitive Information Through Data Queries"
      },
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the Linux kernel's EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-4159"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2021-4159",
          "url": "https://access.redhat.com/security/cve/CVE-2021-4159"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2036024",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036024"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=294f2fc6da27620a506e6c050241655459ccd6bd",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=294f2fc6da27620a506e6c050241655459ccd6bd"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html"
        },
        {
          "category": "external",
          "summary": "https://security-tracker.debian.org/tracker/CVE-2021-4159",
          "url": "https://security-tracker.debian.org/tracker/CVE-2021-4159"
        }
      ],
      "release_date": "2022-08-24T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2023-1829",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root.\nWe recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-1829"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28"
        },
        {
          "category": "external",
          "summary": "https://kernel.dance/#8c710f75256bb3cf05ac7b1672c82b92c43f3d28",
          "url": "https://kernel.dance/#8c710f75256bb3cf05ac7b1672c82b92c43f3d28"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230601-0001/",
          "url": "https://security.netapp.com/advisory/ntap-20230601-0001/"
        }
      ],
      "release_date": "2023-04-12T12:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-43976",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel through 5.15.2, mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-43976"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=04d80663f67ccef893061b49ec8a42ff7045ae84",
          "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=04d80663f67ccef893061b49ec8a42ff7045ae84"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/"
        },
        {
          "category": "external",
          "summary": "https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+%40Zekuns-MBP-16.fios-router.home/",
          "url": "https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+%40Zekuns-MBP-16.fios-router.home/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20211210-0001/",
          "url": "https://security.netapp.com/advisory/ntap-20211210-0001/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2022/dsa-5092",
          "url": "https://www.debian.org/security/2022/dsa-5092"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2022/dsa-5096",
          "url": "https://www.debian.org/security/2022/dsa-5096"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujul2022.html",
          "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
        }
      ],
      "release_date": "2021-11-17T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 2.1,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2022-3566",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
      },
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability, which was classified as problematic, was found in Linux Kernel. This affects the function tcp_getsockopt/tcp_setsockopt of the component TCP Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. The identifier VDB-211089 was assigned to this vulnerability.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-3566"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f49cd2f4d6170d27a2c61f1fecb03d8a70c91f57"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?id.211089",
          "url": "https://vuldb.com/?id.211089"
        }
      ],
      "release_date": "2022-10-17T19:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-47171",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: fix memory leak in smsc75xx_bind\n\nSyzbot reported memory leak in smsc75xx_bind().\nThe problem was is non-freed memory in case of\nerrors after memory allocation.\n\nbacktrace:\n  [<ffffffff84245b62>] kmalloc include/linux/slab.h:556 [inline]\n  [<ffffffff84245b62>] kzalloc include/linux/slab.h:686 [inline]\n  [<ffffffff84245b62>] smsc75xx_bind+0x7a/0x334 drivers/net/usb/smsc75xx.c:1460\n  [<ffffffff82b5b2e6>] usbnet_probe+0x3b6/0xc30 drivers/net/usb/usbnet.c:1728",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-47171"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/200dbfcad8011e50c3cec269ed7b980836eeb1fa",
          "url": "https://git.kernel.org/stable/c/200dbfcad8011e50c3cec269ed7b980836eeb1fa"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/22c840596af0c09068b6cf948616e6496e59e07f",
          "url": "https://git.kernel.org/stable/c/22c840596af0c09068b6cf948616e6496e59e07f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/46a8b29c6306d8bbfd92b614ef65a47c900d8e70",
          "url": "https://git.kernel.org/stable/c/46a8b29c6306d8bbfd92b614ef65a47c900d8e70"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/635ac38b36255d3cfb8312cf7c471334f4d537e0",
          "url": "https://git.kernel.org/stable/c/635ac38b36255d3cfb8312cf7c471334f4d537e0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/70c886ac93f87ae7214a0c69151a28a8075dd95b",
          "url": "https://git.kernel.org/stable/c/70c886ac93f87ae7214a0c69151a28a8075dd95b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9e6a3eccb28779710cbbafc4f4258d92509c6d07",
          "url": "https://git.kernel.org/stable/c/9e6a3eccb28779710cbbafc4f4258d92509c6d07"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9e6b8c1ff9d997e1fa16cbd2d60739adf6dc1bbc",
          "url": "https://git.kernel.org/stable/c/9e6b8c1ff9d997e1fa16cbd2d60739adf6dc1bbc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b95fb96e6339e34694dd578fb6bde3575b01af17",
          "url": "https://git.kernel.org/stable/c/b95fb96e6339e34694dd578fb6bde3575b01af17"
        }
      ],
      "release_date": "2024-03-25T10:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2020-26555",
      "cwe": {
        "id": "CWE-863",
        "name": "Incorrect Authorization"
      },
      "notes": [
        {
          "category": "description",
          "text": "Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2020-26555"
        },
        {
          "category": "external",
          "summary": "https://kb.cert.org/vuls/id/799380",
          "url": "https://kb.cert.org/vuls/id/799380"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/"
        },
        {
          "category": "external",
          "summary": "https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/",
          "url": "https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html"
        },
        {
          "category": "external",
          "summary": "https://www.kb.cert.org/vuls/id/799380",
          "url": "https://www.kb.cert.org/vuls/id/799380"
        }
      ],
      "release_date": "2021-05-24T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2022-42719",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-42719"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/171005/Kernel-Live-Patch-Security-Notice-LNS-0091-1.html",
          "url": "http://packetstormsecurity.com/files/171005/Kernel-Live-Patch-Security-Notice-LNS-0091-1.html"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2022/10/13/2",
          "url": "http://www.openwall.com/lists/oss-security/2022/10/13/2"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2022/10/13/5",
          "url": "http://www.openwall.com/lists/oss-security/2022/10/13/5"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.suse.com/show_bug.cgi?id=1204051",
          "url": "https://bugzilla.suse.com/show_bug.cgi?id=1204051"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=ff05d4b45dd89b922578dac497dcabf57cf771c6",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless.git/commit/?id=ff05d4b45dd89b922578dac497dcabf57cf771c6"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00001.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230203-0008/",
          "url": "https://security.netapp.com/advisory/ntap-20230203-0008/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2022/dsa-5257",
          "url": "https://www.debian.org/security/2022/dsa-5257"
        }
      ],
      "release_date": "2022-10-13T23:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-1989",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in btsdio_remove in drivers\\bluetooth\\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-1989"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230601-0004/",
          "url": "https://security.netapp.com/advisory/ntap-20230601-0004/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5492",
          "url": "https://www.debian.org/security/2023/dsa-5492"
        }
      ],
      "release_date": "2023-04-11T21:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-26365",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "description",
          "text": "Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-26365"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2022/07/05/6",
          "url": "http://www.openwall.com/lists/oss-security/2022/07/05/6"
        },
        {
          "category": "external",
          "summary": "http://xenbits.xen.org/xsa/advisory-403.html",
          "url": "http://xenbits.xen.org/xsa/advisory-403.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00000.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGFTRZ66KQYTSYIRT5FRHF5D6O72NWOP/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGFTRZ66KQYTSYIRT5FRHF5D6O72NWOP/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RKRXZ4LHGCGMOG24ZCEJNY6R2BTS4S2Q/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2022/dsa-5191",
          "url": "https://www.debian.org/security/2022/dsa-5191"
        },
        {
          "category": "external",
          "summary": "https://xenbits.xenproject.org/xsa/advisory-403.txt",
          "url": "https://xenbits.xenproject.org/xsa/advisory-403.txt"
        }
      ],
      "release_date": "2022-07-05T13:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.6,
            "baseSeverity": "LOW",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-1118",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-1118"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/29b0589a865b6f66d141d79b2dd1373e4e50fe17",
          "url": "https://github.com/torvalds/linux/commit/29b0589a865b6f66d141d79b2dd1373e4e50fe17"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230413-0003/",
          "url": "https://security.netapp.com/advisory/ntap-20230413-0003/"
        }
      ],
      "release_date": "2023-03-02T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-45934",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-45934"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=ae4569813a6e931258db627cdfe50dfb4f917d5d",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=ae4569813a6e931258db627cdfe50dfb4f917d5d"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NDAKCGDW6CQ6G3RZWYZJO454R3L5CTQB/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NDAKCGDW6CQ6G3RZWYZJO454R3L5CTQB/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230113-0008/",
          "url": "https://security.netapp.com/advisory/ntap-20230113-0008/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5324",
          "url": "https://www.debian.org/security/2023/dsa-5324"
        }
      ],
      "release_date": "2022-11-27T04:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2020-27820",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in Linux kernel, where a use-after-frees in nouveau's postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if \"unbind\" the driver).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2020-27820"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=1901726",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901726"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline%40redhat.com/",
          "url": "https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline%40redhat.com/"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline%40redhat.com/",
          "url": "https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline%40redhat.com/"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline%40redhat.com/",
          "url": "https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline%40redhat.com/"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujul2022.html",
          "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
        }
      ],
      "release_date": "2021-11-03T00:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2021-46932",
      "cwe": {
        "id": "CWE-665",
        "name": "Improper Initialization"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: appletouch - initialize work before device registration\n\nSyzbot has reported warning in __flush_work(). This warning is caused by\nwork->func == NULL, which means missing work initialization.\n\nThis may happen, since input_dev->close() calls\ncancel_work_sync(&dev->work), but dev->work initalization happens _after_\ninput_register_device() call.\n\nSo this patch moves dev->work initialization before registering input\ndevice",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-46932"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/292d2ac61fb0d9276a0f7b7ce4f50426f2a1c99f",
          "url": "https://git.kernel.org/stable/c/292d2ac61fb0d9276a0f7b7ce4f50426f2a1c99f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/975774ea7528b489930b76a77ffc4d5379b95ff2",
          "url": "https://git.kernel.org/stable/c/975774ea7528b489930b76a77ffc4d5379b95ff2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9f329d0d6c91142cf0ad08d23c72dd195db2633c",
          "url": "https://git.kernel.org/stable/c/9f329d0d6c91142cf0ad08d23c72dd195db2633c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9f3ccdc3f6ef10084ceb3a47df0961bec6196fd0",
          "url": "https://git.kernel.org/stable/c/9f3ccdc3f6ef10084ceb3a47df0961bec6196fd0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a02e1404e27855089d2b0a0acc4652c2ce65fe46",
          "url": "https://git.kernel.org/stable/c/a02e1404e27855089d2b0a0acc4652c2ce65fe46"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d1962f263a176f493400b8f91bfbf2bfedce951e",
          "url": "https://git.kernel.org/stable/c/d1962f263a176f493400b8f91bfbf2bfedce951e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d2cb2bf39a6d17ef4bdc0e59c1a35cf5751ad8f4",
          "url": "https://git.kernel.org/stable/c/d2cb2bf39a6d17ef4bdc0e59c1a35cf5751ad8f4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e79ff8c68acb1eddf709d3ac84716868f2a91012",
          "url": "https://git.kernel.org/stable/c/e79ff8c68acb1eddf709d3ac84716868f2a91012"
        }
      ],
      "release_date": "2024-02-27T10:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2021-3612",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds memory write flaw was found in the Linux kernel's joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-3612"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=1974079",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974079"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKGI562LFV5MESTMVTCG5RORSBT6NGBN/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKGI562LFV5MESTMVTCG5RORSBT6NGBN/"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82%40gmail.com/",
          "url": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82%40gmail.com/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20210805-0005/",
          "url": "https://security.netapp.com/advisory/ntap-20210805-0005/"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujul2022.html",
          "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
        }
      ],
      "release_date": "2021-07-09T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-3923",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel's implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-3923"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2019643",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019643"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/all/20220204100036.GA12348%40kili/",
          "url": "https://lore.kernel.org/all/20220204100036.GA12348%40kili/"
        }
      ],
      "release_date": "2023-03-27T21:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 2.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ]
    },
    {
      "cve": "CVE-2023-6610",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-6610"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0723",
          "url": "https://access.redhat.com/errata/RHSA-2024:0723"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0724",
          "url": "https://access.redhat.com/errata/RHSA-2024:0724"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0725",
          "url": "https://access.redhat.com/errata/RHSA-2024:0725"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0881",
          "url": "https://access.redhat.com/errata/RHSA-2024:0881"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:0897",
          "url": "https://access.redhat.com/errata/RHSA-2024:0897"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:1248",
          "url": "https://access.redhat.com/errata/RHSA-2024:1248"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:1404",
          "url": "https://access.redhat.com/errata/RHSA-2024:1404"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2024:2094",
          "url": "https://access.redhat.com/errata/RHSA-2024:2094"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2023-6610",
          "url": "https://access.redhat.com/security/cve/CVE-2023-6610"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.kernel.org/show_bug.cgi?id=218219",
          "url": "https://bugzilla.kernel.org/show_bug.cgi?id=218219"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2253614",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253614"
        }
      ],
      "release_date": "2023-12-08T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-34693",
      "cwe": {
        "id": "CWE-909",
        "name": "Missing Initialization of Resource"
      },
      "notes": [
        {
          "category": "description",
          "text": "net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-34693"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2021/06/15/1",
          "url": "http://www.openwall.com/lists/oss-security/2021/06/15/1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5e87ddbe3942e27e939bdc02deb8579b0cbd8ecc",
          "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5e87ddbe3942e27e939bdc02deb8579b0cbd8ecc"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076%403c-app-gmx-bs04/T/",
          "url": "https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076%403c-app-gmx-bs04/T/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2021/dsa-4941",
          "url": "https://www.debian.org/security/2021/dsa-4941"
        }
      ],
      "release_date": "2021-06-14T22:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 2.1,
            "baseSeverity": "LOW",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2023-1838",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-1838"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/netdev/20220516084213.26854-1-jasowang%40redhat.com/T/",
          "url": "https://lore.kernel.org/netdev/20220516084213.26854-1-jasowang%40redhat.com/T/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230517-0003/",
          "url": "https://security.netapp.com/advisory/ntap-20230517-0003/"
        }
      ],
      "release_date": "2023-04-05T19:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-40283",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-40283"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html",
          "url": "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html",
          "url": "http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html"
        },
        {
          "category": "external",
          "summary": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.10",
          "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.10"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1728137b33c00d5a2b5110ed7aafb42e7c32e4a1",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1728137b33c00d5a2b5110ed7aafb42e7c32e4a1"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/1728137b33c00d5a2b5110ed7aafb42e7c32e4a1",
          "url": "https://github.com/torvalds/linux/commit/1728137b33c00d5a2b5110ed7aafb42e7c32e4a1"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20231020-0007/",
          "url": "https://security.netapp.com/advisory/ntap-20231020-0007/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5480",
          "url": "https://www.debian.org/security/2023/dsa-5480"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5492",
          "url": "https://www.debian.org/security/2023/dsa-5492"
        }
      ],
      "release_date": "2023-08-14T03:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-3424",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-3424"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132640"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
          "url": "https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
          "url": "https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230406-0005/",
          "url": "https://security.netapp.com/advisory/ntap-20230406-0005/"
        },
        {
          "category": "external",
          "summary": "https://www.spinics.net/lists/kernel/msg4518970.html",
          "url": "https://www.spinics.net/lists/kernel/msg4518970.html"
        }
      ],
      "release_date": "2023-03-06T23:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-41858",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-41858"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/ec4eb8a86ade4d22633e1da2a7d85a846b7d1798",
          "url": "https://github.com/torvalds/linux/commit/ec4eb8a86ade4d22633e1da2a7d85a846b7d1798"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230223-0006/",
          "url": "https://security.netapp.com/advisory/ntap-20230223-0006/"
        }
      ],
      "release_date": "2023-01-17T18:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-0812",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "description",
          "text": "An information leak flaw was found in NFS over RDMA in the net/sunrpc/xprtrdma/rpc_rdma.c in the Linux Kernel. This flaw allows an attacker with normal user privileges to leak kernel information.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-0812"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2022-0812",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0812"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2058361",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2058361"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2058955",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2058955"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=912288442cb2f431bf3c8cb097a5de83bc6dbac1",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=912288442cb2f431bf3c8cb097a5de83bc6dbac1"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230427-0011/",
          "url": "https://security.netapp.com/advisory/ntap-20230427-0011/"
        },
        {
          "category": "external",
          "summary": "https://ubuntu.com/security/CVE-2022-0812",
          "url": "https://ubuntu.com/security/CVE-2022-0812"
        }
      ],
      "release_date": "2022-08-29T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2022-25265",
      "cwe": {
        "id": "CWE-913",
        "name": "Improper Control of Dynamically-Managed Code Resources"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel through 5.16.10, certain binary files may have the exec-all attribute if they were built in approximately 2003 (e.g., with GCC 3.2.2 and Linux kernel 2.4.20). This can cause execution of bytes located in supposedly non-executable regions of a file.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-25265"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294",
          "url": "https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294"
        },
        {
          "category": "external",
          "summary": "https://github.com/x0reaxeax/exec-prot-bypass",
          "url": "https://github.com/x0reaxeax/exec-prot-bypass"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20220318-0005/",
          "url": "https://security.netapp.com/advisory/ntap-20220318-0005/"
        }
      ],
      "release_date": "2022-02-16T21:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-40490",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
      },
      "notes": [
        {
          "category": "description",
          "text": "A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-40490"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=9e445093e523f3277081314c864f708fd4bd34aa",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=9e445093e523f3277081314c864f708fd4bd34aa"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6VS2DLGT7TK7URKAS2KWJL3S533SGVA/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6VS2DLGT7TK7URKAS2KWJL3S533SGVA/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XJGX3DMJT6MRBW2XEF3TWVHYWZW3DG3N/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XJGX3DMJT6MRBW2XEF3TWVHYWZW3DG3N/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20211004-0001/",
          "url": "https://security.netapp.com/advisory/ntap-20211004-0001/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2021/dsa-4978",
          "url": "https://www.debian.org/security/2021/dsa-4978"
        }
      ],
      "release_date": "2021-09-03T01:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-3111",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. This possible flaw can be triggered by calling btrfs_ioctl_balance() before calling btrfs_ioctl_defrag().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-3111"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
        },
        {
          "category": "external",
          "summary": "https://patchwork.kernel.org/project/linux-btrfs/patch/20220721074829.2905233-1-r33s3n6%40gmail.com/",
          "url": "https://patchwork.kernel.org/project/linux-btrfs/patch/20220721074829.2905233-1-r33s3n6%40gmail.com/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230703-0007/",
          "url": "https://security.netapp.com/advisory/ntap-20230703-0007/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5480",
          "url": "https://www.debian.org/security/2023/dsa-5480"
        }
      ],
      "release_date": "2023-06-05T21:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-1513",
      "cwe": {
        "id": "CWE-665",
        "name": "Improper Initialization"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in KVM. When calling the KVM_GET_DEBUGREGS ioctl, on 32-bit systems, there might be some uninitialized portions of the kvm_debugregs structure that could be copied to userspace, causing an information leak.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-1513"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2179892",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179892"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/2c10b61421a28e95a46ab489fd56c0f442ff6952",
          "url": "https://github.com/torvalds/linux/commit/2c10b61421a28e95a46ab489fd56c0f442ff6952"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/kvm/20230214103304.3689213-1-gregkh%40linuxfoundation.org/",
          "url": "https://lore.kernel.org/kvm/20230214103304.3689213-1-gregkh%40linuxfoundation.org/"
        }
      ],
      "release_date": "2023-03-23T21:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ]
    },
    {
      "cve": "CVE-2021-3178",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
      },
      "notes": [
        {
          "category": "description",
          "text": "fs/nfsd/nfs3xdr.c in the Linux kernel through 5.10.8, when there is an NFS export of a subdirectory of a filesystem, allows remote attackers to traverse to other parts of the filesystem via READDIRPLUS. NOTE: some parties argue that such a subdirectory export is not intended to prevent this attack; see also the exports(5) no_subtree_check default behavior",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-3178"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51b2ee7d006a736a9126e8111d1f24e4fd0afaa6",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51b2ee7d006a736a9126e8111d1f24e4fd0afaa6"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5SGB7TNDVQEOJ7NVTGX56UWHDNQM5TRC/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5SGB7TNDVQEOJ7NVTGX56UWHDNQM5TRC/"
        },
        {
          "category": "external",
          "summary": "https://patchwork.kernel.org/project/linux-nfs/patch/20210111210129.GA11652%40fieldses.org/",
          "url": "https://patchwork.kernel.org/project/linux-nfs/patch/20210111210129.GA11652%40fieldses.org/"
        }
      ],
      "release_date": "2021-01-19T07:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2022-4095",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in Linux kernel before 5.19.2. This issue occurs in cmd_hdl_filter in drivers/staging/rtl8712/rtl8712_cmd.c, allowing an attacker to launch a local denial of service attack and gain escalation of privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-4095"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c53b3dcb9942b8ed7f81ee3921c4085d87070c73",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c53b3dcb9942b8ed7f81ee3921c4085d87070c73"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230420-0005/",
          "url": "https://security.netapp.com/advisory/ntap-20230420-0005/"
        }
      ],
      "release_date": "2023-03-22T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-46936",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix use-after-free in tw_timer_handler\n\nA real world panic issue was found as follow in Linux 5.4.\n\n    BUG: unable to handle page fault for address: ffffde49a863de28\n    PGD 7e6fe62067 P4D 7e6fe62067 PUD 7e6fe63067 PMD f51e064067 PTE 0\n    RIP: 0010:tw_timer_handler+0x20/0x40\n    Call Trace:\n     <IRQ>\n     call_timer_fn+0x2b/0x120\n     run_timer_softirq+0x1ef/0x450\n     __do_softirq+0x10d/0x2b8\n     irq_exit+0xc7/0xd0\n     smp_apic_timer_interrupt+0x68/0x120\n     apic_timer_interrupt+0xf/0x20\n\nThis issue was also reported since 2017 in the thread [1],\nunfortunately, the issue was still can be reproduced after fixing\nDCCP.\n\nThe ipv4_mib_exit_net is called before tcp_sk_exit_batch when a net\nnamespace is destroyed since tcp_sk_ops is registered befrore\nipv4_mib_ops, which means tcp_sk_ops is in the front of ipv4_mib_ops\nin the list of pernet_list. There will be a use-after-free on\nnet->mib.net_statistics in tw_timer_handler after ipv4_mib_exit_net\nif there are some inflight time-wait timers.\n\nThis bug is not introduced by commit f2bf415cfed7 (\"mib: add net to\nNET_ADD_STATS_BH\") since the net_statistics is a global variable\ninstead of dynamic allocation and freeing. Actually, commit\n61a7e26028b9 (\"mib: put net statistics on struct net\") introduces\nthe bug since it put net statistics on struct net and free it when\nnet namespace is destroyed.\n\nMoving init_ipv4_mibs() to the front of tcp_init() to fix this bug\nand replace pr_crit() with panic() since continuing is meaningless\nwhen init_ipv4_mibs() fails.\n\n[1] https://groups.google.com/g/syzkaller/c/p1tn-_Kc6l4/m/smuL_FMAAgAJ?pli=1",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-46936"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/08eacbd141e2495d2fcdde84358a06c4f95cbb13",
          "url": "https://git.kernel.org/stable/c/08eacbd141e2495d2fcdde84358a06c4f95cbb13"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/15579e1301f856ad9385d720c9267c11032a5022",
          "url": "https://git.kernel.org/stable/c/15579e1301f856ad9385d720c9267c11032a5022"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2386e81a1d277f540e1285565c9d41d531bb69d4",
          "url": "https://git.kernel.org/stable/c/2386e81a1d277f540e1285565c9d41d531bb69d4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5c2fe20ad37ff56070ae0acb34152333976929b4",
          "url": "https://git.kernel.org/stable/c/5c2fe20ad37ff56070ae0acb34152333976929b4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a8e1944b44f94f5c5f530e434c5eaee787254566",
          "url": "https://git.kernel.org/stable/c/a8e1944b44f94f5c5f530e434c5eaee787254566"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e22e45fc9e41bf9fcc1e92cfb78eb92786728ef0",
          "url": "https://git.kernel.org/stable/c/e22e45fc9e41bf9fcc1e92cfb78eb92786728ef0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e73164e89d1be561228a4534e1091369ee4ba41a",
          "url": "https://git.kernel.org/stable/c/e73164e89d1be561228a4534e1091369ee4ba41a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fe5838c22b986c1190f1dce9aa09bf6a491c1a69",
          "url": "https://git.kernel.org/stable/c/fe5838c22b986c1190f1dce9aa09bf6a491c1a69"
        }
      ],
      "release_date": "2024-02-27T10:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-47153",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: i801: Don't generate an interrupt on bus reset\n\nNow that the i2c-i801 driver supports interrupts, setting the KILL bit\nin a attempt to recover from a timed out transaction triggers an\ninterrupt. Unfortunately, the interrupt handler (i801_isr) is not\nprepared for this situation and will try to process the interrupt as\nif it was signaling the end of a successful transaction. In the case\nof a block transaction, this can result in an out-of-range memory\naccess.\n\nThis condition was reproduced several times by syzbot:\nhttps://syzkaller.appspot.com/bug?extid=ed71512d469895b5b34e\nhttps://syzkaller.appspot.com/bug?extid=8c8dedc0ba9e03f6c79e\nhttps://syzkaller.appspot.com/bug?extid=c8ff0b6d6c73d81b610e\nhttps://syzkaller.appspot.com/bug?extid=33f6c360821c399d69eb\nhttps://syzkaller.appspot.com/bug?extid=be15dc0b1933f04b043a\nhttps://syzkaller.appspot.com/bug?extid=b4d3fd1dfd53e90afd79\n\nSo disable interrupts while trying to reset the bus. Interrupts will\nbe enabled again for the following transaction.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-47153"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/04cc05e3716ae31b17ecdab7bc55c8170def1b8b",
          "url": "https://git.kernel.org/stable/c/04cc05e3716ae31b17ecdab7bc55c8170def1b8b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/09c9e79f4c10cfb6b9e0e1b4dd355232e4b5a3b3",
          "url": "https://git.kernel.org/stable/c/09c9e79f4c10cfb6b9e0e1b4dd355232e4b5a3b3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1f583d3813f204449037cd2acbfc09168171362a",
          "url": "https://git.kernel.org/stable/c/1f583d3813f204449037cd2acbfc09168171362a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b523feb7e8e44652f92f3babb953a976e7ccbbef",
          "url": "https://git.kernel.org/stable/c/b523feb7e8e44652f92f3babb953a976e7ccbbef"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c70e1ba2e7e65255a0ce004f531dd90dada97a8c",
          "url": "https://git.kernel.org/stable/c/c70e1ba2e7e65255a0ce004f531dd90dada97a8c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dfa8929e117b0228a7765f5c3f5988a4a028f3c6",
          "url": "https://git.kernel.org/stable/c/dfa8929e117b0228a7765f5c3f5988a4a028f3c6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e4d8716c3dcec47f1557024add24e1f3c09eb24b",
          "url": "https://git.kernel.org/stable/c/e4d8716c3dcec47f1557024add24e1f3c09eb24b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f9469082126cebb7337db3992d143f5e4edfe629",
          "url": "https://git.kernel.org/stable/c/f9469082126cebb7337db3992d143f5e4edfe629"
        }
      ],
      "release_date": "2024-03-25T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-1353",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-1353"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2066819",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2066819"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/9a564bccb78a76740ea9d75a259942df8143d02c",
          "url": "https://github.com/torvalds/linux/commit/9a564bccb78a76740ea9d75a259942df8143d02c"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20220629-0001/",
          "url": "https://security.netapp.com/advisory/ntap-20220629-0001/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2022/dsa-5127",
          "url": "https://www.debian.org/security/2022/dsa-5127"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2022/dsa-5173",
          "url": "https://www.debian.org/security/2022/dsa-5173"
        }
      ],
      "release_date": "2022-04-29T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 3.6,
            "baseSeverity": "LOW",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-26898",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\naoe: fix the potential use-after-free problem in aoecmd_cfg_pkts\n\nThis patch is against CVE-2023-6270. The description of cve is:\n\n  A flaw was found in the ATA over Ethernet (AoE) driver in the Linux\n  kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on\n  `struct net_device`, and a use-after-free can be triggered by racing\n  between the free on the struct and the access through the `skbtxq`\n  global queue. This could lead to a denial of service condition or\n  potential code execution.\n\nIn aoecmd_cfg_pkts(), it always calls dev_put(ifp) when skb initial\ncode is finished. But the net_device ifp will still be used in\nlater tx()->dev_queue_xmit() in kthread. Which means that the\ndev_put(ifp) should NOT be called in the success path of skb\ninitial code in aoecmd_cfg_pkts(). Otherwise tx() may run into\nuse-after-free because the net_device is freed.\n\nThis patch removed the dev_put(ifp) in the success path in\naoecmd_cfg_pkts(), and added dev_put() after skb xmit in tx().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-26898"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/079cba4f4e307c69878226fdf5228c20aa1c969c",
          "url": "https://git.kernel.org/stable/c/079cba4f4e307c69878226fdf5228c20aa1c969c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1a54aa506b3b2f31496731039e49778f54eee881",
          "url": "https://git.kernel.org/stable/c/1a54aa506b3b2f31496731039e49778f54eee881"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/74ca3ef68d2f449bc848c0a814cefc487bf755fa",
          "url": "https://git.kernel.org/stable/c/74ca3ef68d2f449bc848c0a814cefc487bf755fa"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7dd09fa80b0765ce68bfae92f4e2f395ccf0fba4",
          "url": "https://git.kernel.org/stable/c/7dd09fa80b0765ce68bfae92f4e2f395ccf0fba4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a16fbb80064634b254520a46395e36b87ca4731e",
          "url": "https://git.kernel.org/stable/c/a16fbb80064634b254520a46395e36b87ca4731e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ad80c34944d7175fa1f5c7a55066020002921a99",
          "url": "https://git.kernel.org/stable/c/ad80c34944d7175fa1f5c7a55066020002921a99"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/eb48680b0255a9e8a9bdc93d6a55b11c31262e62",
          "url": "https://git.kernel.org/stable/c/eb48680b0255a9e8a9bdc93d6a55b11c31262e62"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f98364e926626c678fb4b9004b75cacf92ff0662",
          "url": "https://git.kernel.org/stable/c/f98364e926626c678fb4b9004b75cacf92ff0662"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/faf0b4c5e00bb680e8e43ac936df24d3f48c8e65",
          "url": "https://git.kernel.org/stable/c/faf0b4c5e00bb680e8e43ac936df24d3f48c8e65"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"
        }
      ],
      "release_date": "2024-04-17T11:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-45868",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel before 5.15.3, fs/quota/quota_tree.c does not validate the block number in the quota tree (on disk). This can, for example, lead to a kernel/locking/rwsem.c use-after-free if there is a corrupted quota file.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-45868"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.kernel.org/show_bug.cgi?id=214655",
          "url": "https://bugzilla.kernel.org/show_bug.cgi?id=214655"
        },
        {
          "category": "external",
          "summary": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.3",
          "url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9bf3d20331295b1ecb81f4ed9ef358c51699a050",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9bf3d20331295b1ecb81f4ed9ef358c51699a050"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20220419-0003/",
          "url": "https://security.netapp.com/advisory/ntap-20220419-0003/"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/03/17/1",
          "url": "https://www.openwall.com/lists/oss-security/2022/03/17/1"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2022/03/17/2",
          "url": "https://www.openwall.com/lists/oss-security/2022/03/17/2"
        }
      ],
      "release_date": "2022-03-18T07:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2021-3640",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-3640"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=1980646",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980646"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&id=99c23da0eed4fd20cae8243f2b51e10e66aa0951",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&id=99c23da0eed4fd20cae8243f2b51e10e66aa0951"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/99c23da0eed4fd20cae8243f2b51e10e66aa0951",
          "url": "https://github.com/torvalds/linux/commit/99c23da0eed4fd20cae8243f2b51e10e66aa0951"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html",
          "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20220419-0003/",
          "url": "https://security.netapp.com/advisory/ntap-20220419-0003/"
        },
        {
          "category": "external",
          "summary": "https://ubuntu.com/security/CVE-2021-3640",
          "url": "https://ubuntu.com/security/CVE-2021-3640"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2022/dsa-5096",
          "url": "https://www.debian.org/security/2022/dsa-5096"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2021/07/22/1",
          "url": "https://www.openwall.com/lists/oss-security/2021/07/22/1"
        }
      ],
      "release_date": "2022-03-03T23:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 6.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-52435",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: prevent mss overflow in skb_segment()\n\nOnce again syzbot is able to crash the kernel in skb_segment() [1]\n\nGSO_BY_FRAGS is a forbidden value, but unfortunately the following\ncomputation in skb_segment() can reach it quite easily :\n\n\tmss = mss * partial_segs;\n\n65535 = 3 * 5 * 17 * 257, so many initial values of mss can lead to\na bad final result.\n\nMake sure to limit segmentation so that the new mss value is smaller\nthan GSO_BY_FRAGS.\n\n[1]\n\ngeneral protection fault, probably for non-canonical address 0xdffffc000000000e: 0000 [#1] PREEMPT SMP KASAN\nKASAN: null-ptr-deref in range [0x0000000000000070-0x0000000000000077]\nCPU: 1 PID: 5079 Comm: syz-executor993 Not tainted 6.7.0-rc4-syzkaller-00141-g1ae4cd3cbdd0 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023\nRIP: 0010:skb_segment+0x181d/0x3f30 net/core/skbuff.c:4551\nCode: 83 e3 02 e9 fb ed ff ff e8 90 68 1c f9 48 8b 84 24 f8 00 00 00 48 8d 78 70 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 8a 21 00 00 48 8b 84 24 f8 00\nRSP: 0018:ffffc900043473d0 EFLAGS: 00010202\nRAX: dffffc0000000000 RBX: 0000000000010046 RCX: ffffffff886b1597\nRDX: 000000000000000e RSI: ffffffff886b2520 RDI: 0000000000000070\nRBP: ffffc90004347578 R08: 0000000000000005 R09: 000000000000ffff\nR10: 000000000000ffff R11: 0000000000000002 R12: ffff888063202ac0\nR13: 0000000000010000 R14: 000000000000ffff R15: 0000000000000046\nFS: 0000555556e7e380(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020010000 CR3: 0000000027ee2000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n<TASK>\nudp6_ufo_fragment+0xa0e/0xd00 net/ipv6/udp_offload.c:109\nipv6_gso_segment+0x534/0x17e0 net/ipv6/ip6_offload.c:120\nskb_mac_gso_segment+0x290/0x610 net/core/gso.c:53\n__skb_gso_segment+0x339/0x710 net/core/gso.c:124\nskb_gso_segment include/net/gso.h:83 [inline]\nvalidate_xmit_skb+0x36c/0xeb0 net/core/dev.c:3626\n__dev_queue_xmit+0x6f3/0x3d60 net/core/dev.c:4338\ndev_queue_xmit include/linux/netdevice.h:3134 [inline]\npacket_xmit+0x257/0x380 net/packet/af_packet.c:276\npacket_snd net/packet/af_packet.c:3087 [inline]\npacket_sendmsg+0x24c6/0x5220 net/packet/af_packet.c:3119\nsock_sendmsg_nosec net/socket.c:730 [inline]\n__sock_sendmsg+0xd5/0x180 net/socket.c:745\n__sys_sendto+0x255/0x340 net/socket.c:2190\n__do_sys_sendto net/socket.c:2202 [inline]\n__se_sys_sendto net/socket.c:2198 [inline]\n__x64_sys_sendto+0xe0/0x1b0 net/socket.c:2198\ndo_syscall_x64 arch/x86/entry/common.c:52 [inline]\ndo_syscall_64+0x40/0x110 arch/x86/entry/common.c:83\nentry_SYSCALL_64_after_hwframe+0x63/0x6b\nRIP: 0033:0x7f8692032aa9\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 d1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fff8d685418 EFLAGS: 00000246 ORIG_RAX: 000000000000002c\nRAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f8692032aa9\nRDX: 0000000000010048 RSI: 00000000200000c0 RDI: 0000000000000003\nRBP: 00000000000f4240 R08: 0000000020000540 R09: 0000000000000014\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007fff8d685480\nR13: 0000000000000001 R14: 00007fff8d685480 R15: 0000000000000003\n</TASK>\nModules linked in:\n---[ end trace 0000000000000000 ]---\nRIP: 0010:skb_segment+0x181d/0x3f30 net/core/skbuff.c:4551\nCode: 83 e3 02 e9 fb ed ff ff e8 90 68 1c f9 48 8b 84 24 f8 00 00 00 48 8d 78 70 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 8a 21 00 00 48 8b 84 24 f8 00\nRSP: 0018:ffffc900043473d0 EFLAGS: 00010202\nRAX: dffffc0000000000 RBX: 0000000000010046 RCX: ffffffff886b1597\nRDX: 000000000000000e RSI: ffffffff886b2520 RDI: 0000000000000070\nRBP: ffffc90004347578 R0\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-52435"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0d3ffbbf8631d6db0552f46250015648991c856f",
          "url": "https://git.kernel.org/stable/c/0d3ffbbf8631d6db0552f46250015648991c856f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/23d05d563b7e7b0314e65c8e882bc27eac2da8e7",
          "url": "https://git.kernel.org/stable/c/23d05d563b7e7b0314e65c8e882bc27eac2da8e7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6c53e8547687d9c767c139cd4b50af566f58c29a",
          "url": "https://git.kernel.org/stable/c/6c53e8547687d9c767c139cd4b50af566f58c29a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8f8f185643747fbb448de6aab0efa51c679909a3",
          "url": "https://git.kernel.org/stable/c/8f8f185643747fbb448de6aab0efa51c679909a3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/95b3904a261a9f810205da560e802cc326f50d77",
          "url": "https://git.kernel.org/stable/c/95b3904a261a9f810205da560e802cc326f50d77"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/989b0ff35fe5fc9652ee5bafbe8483db6f27b137",
          "url": "https://git.kernel.org/stable/c/989b0ff35fe5fc9652ee5bafbe8483db6f27b137"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cd1022eaf87be8e6151435bd4df4c242c347e083",
          "url": "https://git.kernel.org/stable/c/cd1022eaf87be8e6151435bd4df4c242c347e083"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"
        }
      ],
      "release_date": "2024-02-20T20:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2023-3268",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-3268"
        },
        {
          "category": "external",
          "summary": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2",
          "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43ec16f1450f4936025a9bdf1a273affdb9732c1",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43ec16f1450f4936025a9bdf1a273affdb9732c1"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/lkml/1682238502-1892-1-git-send-email-yangpc%40wangsu.com/T/",
          "url": "https://lore.kernel.org/lkml/1682238502-1892-1-git-send-email-yangpc%40wangsu.com/T/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230824-0006/",
          "url": "https://security.netapp.com/advisory/ntap-20230824-0006/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5448",
          "url": "https://www.debian.org/security/2023/dsa-5448"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5480",
          "url": "https://www.debian.org/security/2023/dsa-5480"
        }
      ],
      "release_date": "2023-06-16T19:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-0129",
      "notes": [
        {
          "category": "description",
          "text": "Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
          "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-0129"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html",
          "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html"
        },
        {
          "category": "external",
          "summary": "https://security.gentoo.org/glsa/202209-16",
          "url": "https://security.gentoo.org/glsa/202209-16"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20210716-0002/",
          "url": "https://security.netapp.com/advisory/ntap-20210716-0002/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2021/dsa-4951",
          "url": "https://www.debian.org/security/2021/dsa-4951"
        },
        {
          "category": "external",
          "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html"
        }
      ],
      "release_date": "2021-06-09T20:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-07-08T15:54:42Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480",
          "product_ids": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1720468480"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "SINGLE",
            "availabilityImpact": "NONE",
            "baseScore": 2.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:A/AC:L/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CentOS-7:bpftool-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-debug-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-headers-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:kernel-tools-libs-devel-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64",
            "CentOS-7:python-perf-0:3.10.0-1160.119.1.el7.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    }
  ]
}