RHSA-2026:9643

Vulnerability from csaf_redhat - Published: 2026-04-22 07:55 - Updated: 2026-04-23 01:34
Summary
Red Hat Security Advisory: kernel security update
Severity
Moderate
Notes
Topic: An update for kernel is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support and Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details: The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es): * kernel: smc: Fix use-after-free in __pnet_find_base_ndev() (CVE-2025-40064) * kernel: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (CVE-2025-40168) * kernel: net/sched: cls_u32: use skb_header_pointer_careful() (CVE-2026-23204) * kernel: kernel: Privilege escalation or denial of service via use-after-free in nf_tables_addchain() (CVE-2026-23231) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

In the Linux kernel, the following vulnerability has been resolved: smc: Fix use-after-free in __pnet_find_base_ndev(). syzbot reported use-after-free of net_device in __pnet_find_base_ndev(), which was called during connect(). [0] smc_pnet_find_ism_resource() fetches sk_dst_get(sk)->dev and passes down to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened at __pnet_find_base_ndev() when the dev is first used. This means dev had already been freed before acquiring RTNL in pnet_find_base_ndev(). While dev is going away, dst->dev could be swapped with blackhole_netdev, and the dev's refcnt by dst will be released. We must hold dev's refcnt before calling smc_pnet_find_ism_resource(). Also, smc_pnet_find_roce_resource() has the same problem. Let's use __sk_dst_get() and dst_dev_rcu() in the two functions. [0]: BUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926 Read of size 1 at addr ffff888036bac33a by task syz.0.3632/18609 CPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 Call Trace: <TASK> dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0xca/0x240 mm/kasan/report.c:482 kasan_report+0x118/0x150 mm/kasan/report.c:595 __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926 pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline] smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline] smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154 smc_find_ism_device net/smc/af_smc.c:1030 [inline] smc_find_proposal_devices net/smc/af_smc.c:1115 [inline] __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545 smc_connect+0x877/0xd90 net/smc/af_smc.c:1715 __sys_connect_file net/socket.c:2086 [inline] __sys_connect+0x313/0x440 net/socket.c:2105 __do_sys_connect net/socket.c:2111 [inline] __se_sys_connect net/socket.c:2108 [inline] __x64_sys_connect+0x7a/0x90 net/socket.c:2108 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f47cbf8eba9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a RAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9 RDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b RBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8 </TASK> The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000 raw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as freed page last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851 prep_new_page mm/page_alloc.c:1859 [inline] get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858 __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148 alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416 ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317 __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348 __do_kmalloc_node mm/slub.c:4364 [inline] __kvmalloc_node ---truncated---

CWE-825 - Expired Pointer Dereference
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. https://access.redhat.com/errata/RHSA-2026:9643

A flaw was found in the Linux kernel’s SMC (Shared Memory Communication) module: in smc_clc_prfx_match(), the function is called from smc_listen_work() without proper RCU or RTNL protection. The code previously used sk_dst_get(sk)->dev, which can lead to a use-after-free (UAF) condition if the sk’s destination is freed concurrently.

CWE-416 - Use After Free
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. https://access.redhat.com/errata/RHSA-2026:9643
Workaround Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_u32: use skb_header_pointer_careful() skb_header_pointer() does not fully validate negative @offset values. Use skb_header_pointer_careful() instead. GangMin Kim provided a report and a repro fooling u32_classify(): BUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0 net/sched/cls_u32.c:221

CWE-1285 - Improper Validation of Specified Index, Position, or Offset in Input
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. https://access.redhat.com/errata/RHSA-2026:9643

A flaw was found in the Linux kernel. A local attacker with CAP_NET_ADMIN capabilities, or remote packet traffic, could exploit a use-after-free vulnerability in the nf_tables_addchain() function's error handling. Successful exploitation could lead to a kernel crash, resulting in a Denial of Service (DoS), or potentially privilege escalation.

CWE-416 - Use After Free
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 The system must be rebooted for this update to take effect. https://access.redhat.com/errata/RHSA-2026:9643
Workaround In order to trigger the issue, it requires the ability to create user/net namespaces. On non-containerized deployments of Red Hat Enterprise Linux 8, it is recommended to disable user namespaces by setting user.max_user_namespaces to 0: # echo "user.max_user_namespaces=0" > /etc/sysctl.d/userns.conf # sysctl -p /etc/sysctl.d/userns.conf On containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.
References
https://access.redhat.com/errata/RHSA-2026:9643 self
https://access.redhat.com/security/updates/classi… external
https://bugzilla.redhat.com/show_bug.cgi?id=2406747 external
https://bugzilla.redhat.com/show_bug.cgi?id=2414482 external
https://bugzilla.redhat.com/show_bug.cgi?id=2439931 external
https://bugzilla.redhat.com/show_bug.cgi?id=2444376 external
https://security.access.redhat.com/data/csaf/v2/a… self
https://access.redhat.com/security/cve/CVE-2025-40064 self
https://bugzilla.redhat.com/show_bug.cgi?id=2406747 external
https://www.cve.org/CVERecord?id=CVE-2025-40064 external
https://nvd.nist.gov/vuln/detail/CVE-2025-40064 external
https://lore.kernel.org/linux-cve-announce/202510… external
https://access.redhat.com/security/cve/CVE-2025-40168 self
https://bugzilla.redhat.com/show_bug.cgi?id=2414482 external
https://www.cve.org/CVERecord?id=CVE-2025-40168 external
https://nvd.nist.gov/vuln/detail/CVE-2025-40168 external
https://lore.kernel.org/linux-cve-announce/202511… external
https://access.redhat.com/security/cve/CVE-2026-23204 self
https://bugzilla.redhat.com/show_bug.cgi?id=2439931 external
https://www.cve.org/CVERecord?id=CVE-2026-23204 external
https://nvd.nist.gov/vuln/detail/CVE-2026-23204 external
https://lore.kernel.org/linux-cve-announce/202602… external
https://access.redhat.com/security/cve/CVE-2026-23231 self
https://bugzilla.redhat.com/show_bug.cgi?id=2444376 external
https://www.cve.org/CVERecord?id=CVE-2026-23231 external
https://nvd.nist.gov/vuln/detail/CVE-2026-23231 external
https://lore.kernel.org/linux-cve-announce/202603… external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support and Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: smc: Fix use-after-free in __pnet_find_base_ndev() (CVE-2025-40064)\n\n* kernel: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (CVE-2025-40168)\n\n* kernel: net/sched: cls_u32: use skb_header_pointer_careful() (CVE-2026-23204)\n\n* kernel: kernel: Privilege escalation or denial of service via use-after-free in nf_tables_addchain() (CVE-2026-23231)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2026:9643",
        "url": "https://access.redhat.com/errata/RHSA-2026:9643"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2406747",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2406747"
      },
      {
        "category": "external",
        "summary": "2414482",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414482"
      },
      {
        "category": "external",
        "summary": "2439931",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2439931"
      },
      {
        "category": "external",
        "summary": "2444376",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2444376"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_9643.json"
      }
    ],
    "title": "Red Hat Security Advisory: kernel security update",
    "tracking": {
      "current_release_date": "2026-04-23T01:34:21+00:00",
      "generator": {
        "date": "2026-04-23T01:34:21+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.7.5"
        }
      },
      "id": "RHSA-2026:9643",
      "initial_release_date": "2026-04-22T07:55:17+00:00",
      "revision_history": [
        {
          "date": "2026-04-22T07:55:17+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-04-22T07:55:17+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2026-04-23T01:34:21+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
                  "product_id": "BaseOS-8.4.0.Z.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_aus:8.4::baseos"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
                  "product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_eus_long_life:8.4::baseos"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
                "product": {
                  "name": "bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_id": "bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool@4.18.0-305.189.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-305.189.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_id": "kernel-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-305.189.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_id": "kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-core@4.18.0-305.189.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_id": "kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-305.189.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_id": "kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-305.189.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_id": "kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-305.189.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_id": "kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-305.189.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_id": "kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-305.189.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_id": "kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-305.189.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_id": "kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-305.189.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_id": "kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-305.189.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_id": "kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-305.189.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_id": "kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-305.189.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:4.18.0-305.189.1.el8_4.x86_64",
                "product": {
                  "name": "perf-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_id": "perf-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf@4.18.0-305.189.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
                "product": {
                  "name": "python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_id": "python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf@4.18.0-305.189.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
                "product": {
                  "name": "bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_id": "bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-305.189.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_id": "kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-305.189.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_id": "kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-305.189.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-305.189.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
                "product": {
                  "name": "kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_id": "kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-305.189.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
                "product": {
                  "name": "perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_id": "perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-305.189.1.el8_4?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
                "product": {
                  "name": "python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_id": "python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-305.189.1.el8_4?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-0:4.18.0-305.189.1.el8_4.src",
                "product": {
                  "name": "kernel-0:4.18.0-305.189.1.el8_4.src",
                  "product_id": "kernel-0:4.18.0-305.189.1.el8_4.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel@4.18.0-305.189.1.el8_4?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
                "product": {
                  "name": "kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
                  "product_id": "kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-305.189.1.el8_4?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
                "product": {
                  "name": "kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
                  "product_id": "kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-305.189.1.el8_4?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.AUS:bpftool-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.AUS:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.189.1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.src"
        },
        "product_reference": "kernel-0:4.18.0-305.189.1.el8_4.src",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch"
        },
        "product_reference": "kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.AUS:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.AUS:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.AUS:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.AUS:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.AUS:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:4.18.0-305.189.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.AUS:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch"
        },
        "product_reference": "kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.AUS:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.AUS:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.AUS:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.AUS:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.AUS:perf-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "perf-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.AUS:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.AUS:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.189.1.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.src"
        },
        "product_reference": "kernel-0:4.18.0-305.189.1.el8_4.src",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch"
        },
        "product_reference": "kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:4.18.0-305.189.1.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch"
        },
        "product_reference": "kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "perf-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
          "product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64"
        },
        "product_reference": "python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
        "relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-40064",
      "cwe": {
        "id": "CWE-825",
        "name": "Expired Pointer Dereference"
      },
      "discovery_date": "2025-10-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2406747"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)-\u003edev and passes\ndown to pnet_find_base_ndev(), where RTNL is held.  Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst-\u003edev could be swapped with blackhole_netdev,\nand the dev\u0027s refcnt by dst will be released.\n\nWe must hold dev\u0027s refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet\u0027s use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n \u003c/TASK\u003e\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: smc: Fix use-after-free in __pnet_find_base_ndev()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.4.0.Z.AUS:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.src",
          "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.AUS:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.AUS:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:perf-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.src",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-40064"
        },
        {
          "category": "external",
          "summary": "RHBZ#2406747",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2406747"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-40064",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-40064",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-40064"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2025102817-CVE-2025-40064-0c16@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2025102817-CVE-2025-40064-0c16@gregkh/T"
        }
      ],
      "release_date": "2025-10-28T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-22T07:55:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.4.0.Z.AUS:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.src",
            "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.AUS:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.AUS:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.src",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:9643"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.4.0.Z.AUS:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.src",
            "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.AUS:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.AUS:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.src",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: smc: Fix use-after-free in __pnet_find_base_ndev()"
    },
    {
      "cve": "CVE-2025-40168",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2025-11-12T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2414482"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel\u2019s SMC (Shared Memory Communication) module: in smc_clc_prfx_match(), the function is called from smc_listen_work() without proper RCU or RTNL protection. The code previously used sk_dst_get(sk)-\u003edev, which can lead to a use-after-free (UAF) condition if the sk\u2019s destination is freed concurrently.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match()",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.4.0.Z.AUS:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.src",
          "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.AUS:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.AUS:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:perf-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.src",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2025-40168"
        },
        {
          "category": "external",
          "summary": "RHBZ#2414482",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414482"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2025-40168",
          "url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-40168",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-40168"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2025111256-CVE-2025-40168-bdd5@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2025111256-CVE-2025-40168-bdd5@gregkh/T"
        }
      ],
      "release_date": "2025-11-12T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-22T07:55:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.4.0.Z.AUS:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.src",
            "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.AUS:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.AUS:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.src",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:9643"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "BaseOS-8.4.0.Z.AUS:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.src",
            "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.AUS:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.AUS:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.src",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.4.0.Z.AUS:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.src",
            "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.AUS:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.AUS:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.src",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match()"
    },
    {
      "cve": "CVE-2026-23204",
      "cwe": {
        "id": "CWE-1285",
        "name": "Improper Validation of Specified Index, Position, or Offset in Input"
      },
      "discovery_date": "2026-02-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2439931"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: cls_u32: use skb_header_pointer_careful()\n\nskb_header_pointer() does not fully validate negative @offset values.\n\nUse skb_header_pointer_careful() instead.\n\nGangMin Kim provided a report and a repro fooling u32_classify():\n\nBUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0\nnet/sched/cls_u32.c:221",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: net/sched: cls_u32: use skb_header_pointer_careful()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "An out of bounds memory access vulnerability exists in the Linux traffic control u32 classifier implementation. In u32_classify the kernel calculates offsets such as toff using key off values masks and variable offsets and then dereferences packet data using skb_header_pointer. The helper skb_header_pointer does not fully validate negative offset values. With a crafted configuration and packet layout the computed offset can become negative or otherwise invalid in a way that bypasses the existing checks and results in an out of bounds access. The most direct impact is a kernel crash causing a denial of service. Because the access pattern involves reading packet data at attacker influenced offsets it may also allow information disclosure of adjacent kernel memory and in worst cases could contribute to privilege escalation chains. Exploitation prerequisites depend on whether the system has tc u32 filters configured on a traffic path. For the CVSS the base score uses PR:L because configuring tc filters typically requires elevated privileges but can be available in containers or network namespaces with CAP_NET_ADMIN.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.4.0.Z.AUS:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.src",
          "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.AUS:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.AUS:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:perf-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.src",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-23204"
        },
        {
          "category": "external",
          "summary": "RHBZ#2439931",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2439931"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-23204",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-23204"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-23204",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23204"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2026021437-CVE-2026-23204-be85@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2026021437-CVE-2026-23204-be85@gregkh/T"
        }
      ],
      "release_date": "2026-02-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-22T07:55:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.4.0.Z.AUS:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.src",
            "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.AUS:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.AUS:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.src",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:9643"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.4.0.Z.AUS:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.src",
            "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.AUS:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.AUS:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.src",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: net/sched: cls_u32: use skb_header_pointer_careful()"
    },
    {
      "cve": "CVE-2026-23231",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2026-03-04T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2444376"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the Linux kernel. A local attacker with CAP_NET_ADMIN capabilities, or remote packet traffic, could exploit a use-after-free vulnerability in the nf_tables_addchain() function\u0027s error handling. Successful exploitation could lead to a kernel crash, resulting in a Denial of Service (DoS), or potentially privilege escalation.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "kernel: kernel: Privilege escalation or denial of service via use-after-free in nf_tables_addchain()",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "A use after free can occur in nf_tables_addchain error handling because a new chain is published to table chains via RCU before hook registration completes and is then freed without an RCU grace period when hook registration fails. This creates a race with RCU readers in the control plane such as nf_tables_dump_chains and also with in flight packet evaluation when an IPv4 hook is transiently installed for NFPROTO_INET and later IPv6 hook registration fails. For the CVSS the PR is L because a local actor with CAP_NET_ADMIN can induce the failing add chain path while remote packet traffic may hit the transient hook and trigger the UAF window. Impact ranges from a kernel crash to potential privilege escalation.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "BaseOS-8.4.0.Z.AUS:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.src",
          "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.AUS:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.AUS:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:perf-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.src",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
          "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-23231"
        },
        {
          "category": "external",
          "summary": "RHBZ#2444376",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2444376"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-23231",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-23231"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-23231",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23231"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/linux-cve-announce/2026030436-CVE-2026-23231-1a96@gregkh/T",
          "url": "https://lore.kernel.org/linux-cve-announce/2026030436-CVE-2026-23231-1a96@gregkh/T"
        }
      ],
      "release_date": "2026-03-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-22T07:55:17+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
          "product_ids": [
            "BaseOS-8.4.0.Z.AUS:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.src",
            "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.AUS:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.AUS:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.src",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64"
          ],
          "restart_required": {
            "category": "machine"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:9643"
        },
        {
          "category": "workaround",
          "details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, it is recommended to disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
          "product_ids": [
            "BaseOS-8.4.0.Z.AUS:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.src",
            "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.AUS:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.AUS:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.src",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "BaseOS-8.4.0.Z.AUS:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.src",
            "BaseOS-8.4.0.Z.AUS:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.AUS:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.AUS:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:bpftool-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.src",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-abi-stablelists-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-core-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debug-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-debuginfo-common-x86_64-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-devel-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-doc-0:4.18.0-305.189.1.el8_4.noarch",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-modules-extra-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:kernel-tools-libs-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-0:4.18.0-305.189.1.el8_4.x86_64",
            "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-perf-debuginfo-0:4.18.0-305.189.1.el8_4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "kernel: kernel: Privilege escalation or denial of service via use-after-free in nf_tables_addchain()"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…