{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID {CVE-2023-4147}\n- net/sched: cls_fw: Fix improper refcount update leads to use-after-free {CVE-2023-3776}\n- netfilter: nft_set_pipapo: fix improper element removal {CVE-2023-4004}\n- x86/cpu/amd: Add a Zenbleed fix {CVE-2023-20593}\n- x86/cpu/amd: Move the errata checking functionality up {CVE-2023-20593}\n- x86/microcode/core: Return an error only when necessary {CVE-2023-20593}\n- x86/microcode/AMD: Fix mixed steppings support {CVE-2023-20593}\n- x86/microcode/AMD: Add a @cpu parameter to the reloading functions {CVE-2023-20593}\n- x86/microcode/amd: Remove load_microcode_amd()'s bsp parameter {CVE-2023-20593}\n- x86/amd: Cache debug register values in percpu variables {CVE-2023-20593}\n- x86/microcode: Adjust late loading result reporting message {CVE-2023-20593}\n- x86/microcode: Check CPU capabilities after late microcode update correctly {CVE-2023-20593}\n- x86/microcode: Add a parameter to microcode_check() to store CPU capabilities\n- x86/microcode/AMD: Rename a couple of functions\n- x86/microcode/AMD: Track patch allocation size explicitly\n- x86/microcode: Print previous version of microcode after reload\n- x86/cpu: Load microcode during restore_processor_state()\n- x86/pm: Add enumeration check before spec MSRs save/restore setup {CVE-2023-1637}\n- x86/tsx: Add a feature bit for TSX control MSR support {CVE-2023-1637}\n- x86/cpu: Restore AMD's DE_CFG MSR after resume {CVE-2023-1637}\n- x86/pm: Fix false positive kmemleak report in msr_build_context() {CVE-2023-1637}\n- x86/speculation: Restore speculation related MSRs during S3 resume {CVE-2023-1637}\n- x86/pm: Save the MSR validity status at context setup {CVE-2023-1637}\n- netfilter: nf_tables: prevent OOB access in nft_byteorder_eval {CVE-2023-35001}\n- netfilter: nf_tables: do not ignore genmask when looking up chain by id {CVE-2023-31248}\n- netfilter: nf_tables: unbind non-anonymous set if rule construction fails {CVE-2023-3390}\n- netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound set/chain {CVE-2023-3390}\n- netfilter: nf_tables: fix chain binding transaction logic {CVE-2023-3390}\n- netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE {CVE-2023-3390}\n- netfilter: nf_tables: validate catch-all set elements {CVE-2023-3390}\n- ipvlan:Fix out-of-bounds caused by unclear skb->cb {CVE-2023-3090}\n- net/sched: flower: fix possible OOB write in fl_set_geneve_opt() {CVE-2023-35788}\n- x86/speculation: Allow enabling STIBP with legacy IBRS {CVE-2023-1998}\n- prlimit: do_prlimit needs to have a speculation check {CVE-2023-0458}\n- KVM: x86/mmu: Fix race condition in direct_page_fault {CVE-2022-45869}\n- i2c: xgene-slimpro: Fix out-of-bounds bug in xgene_slimpro_i2c_xfer() {CVE-2023-2194}\n- perf: Fix check before add_event_to_groups() in perf_group_detach() {CVE-2023-2235}\n- bluetooth: Perform careful capability checks in hci_sock_ioctl() {CVE-2023-2002}\n- net: tls: fix possible race condition between do_tls_getsockopt_conf() and do_tls_setsockopt_conf() {CVE-2023-28466}\n- xfs: verify buffer contents when we skip log replay {CVE-2023-2124}",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/almalinux9.2esu/advisories/2024/clsa-2024_1710164161.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-05-12T20:17:09Z",
      "generator": {
        "date": "2026-05-12T20:17:09Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2024:1710164161",
      "initial_release_date": "2024-03-11T09:36:03Z",
      "revision_history": [
        {
          "date": "2024-03-11T09:36:03Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-05-12T20:17:09Z",
          "number": "2",
          "summary": "Official Publication"
        }
      ],
      "status": "final",
      "version": "2"
    },
    "title": "kernel: Fix of 18 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "AlmaLinux 9.2",
                "product": {
                  "name": "AlmaLinux 9.2",
                  "product_id": "AlmaLinux-9.2",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:almalinux:almalinux:9.2:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "AlmaLinux"
          }
        ],
        "category": "vendor",
        "name": "AlmaLinux OS Foundation"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug-devel@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-core@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug-modules-partner@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-devel-matched@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/bpftool@7.0.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-modules-extra@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug-devel-matched@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-modules-internal@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-tools-libs@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-uki-virt@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/python3-perf@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-modules-partner@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug-modules-core@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug-modules@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/perf@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug-uki-virt@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/rtla@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-ipaclones-internal@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-selftests-internal@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-cross-headers@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-modules-core@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug-modules-internal@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug-core@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-tools@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-devel@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-tools-libs-devel@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-modules@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-headers@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                "product": {
                  "name": "kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_id": "kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-debug-modules-extra@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
                "product": {
                  "name": "kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
                  "product_id": "kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-doc@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
                "product": {
                  "name": "kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
                  "product_id": "kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/kernel-abi-stablelists@5.14.0-284.11.1.el9_2.tuxcare.5.els1?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch"
        },
        "product_reference": "kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch"
        },
        "product_reference": "kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        },
        "product_reference": "kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-35001",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-35001"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html",
          "url": "http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html",
          "url": "http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/07/05/3",
          "url": "http://www.openwall.com/lists/oss-security/2023/07/05/3"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGZC5XOANA75OJ4XARBBXYSLDKUIJI5E/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGZC5XOANA75OJ4XARBBXYSLDKUIJI5E/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPHI46ROSSLVAV4R5LJWJYU747JGOS6D/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPHI46ROSSLVAV4R5LJWJYU747JGOS6D/"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/netfilter-devel/20230705121515.747251-1-cascardo@canonical.com/T/",
          "url": "https://lore.kernel.org/netfilter-devel/20230705121515.747251-1-cascardo@canonical.com/T/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230824-0007/",
          "url": "https://security.netapp.com/advisory/ntap-20230824-0007/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5453",
          "url": "https://www.debian.org/security/2023/dsa-5453"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2023/07/05/3",
          "url": "https://www.openwall.com/lists/oss-security/2023/07/05/3"
        }
      ],
      "release_date": "2023-07-05T19:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-03-11T09:36:03Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161",
          "product_ids": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-45869",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
      },
      "notes": [
        {
          "category": "description",
          "text": "A race condition in the x86 KVM subsystem in the Linux kernel through 6.1-rc6 allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualisation and the TDP MMU are enabled.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-45869"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=47b0c2e4c220f2251fd8dcfbb44479819c715e15",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=47b0c2e4c220f2251fd8dcfbb44479819c715e15"
        }
      ],
      "release_date": "2022-11-30T05:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-03-11T09:36:03Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161",
          "product_ids": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2023-1637",
      "cwe": {
        "id": "CWE-226",
        "name": "Sensitive Information in Resource Not Removed Before Reuse"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw that boot CPU could be vulnerable for the speculative execution behavior kind of attacks in the Linux kernel X86 CPU Power management options functionality was found in the way user resuming CPU from suspend-to-RAM. A local user could use this flaw to potentially get unauthorized access to some memory of the CPU similar to the speculative execution behavior kind of attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-1637"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e2a1256b17b16f9b9adf1b6fea56819e7b68e463",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e2a1256b17b16f9b9adf1b6fea56819e7b68e463"
        },
        {
          "category": "external",
          "summary": "https://sourceware.org/bugzilla/show_bug.cgi?id=27398",
          "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=27398"
        }
      ],
      "release_date": "2023-03-27T22:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-03-11T09:36:03Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161",
          "product_ids": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2023-3090",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation.\n\nThe out-of-bounds write is caused by missing skb->cb  initialization in the ipvlan network driver. The vulnerability is reachable if CONFIG_IPVLAN is enabled.\n\n\nWe recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-3090"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html",
          "url": "http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html",
          "url": "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=90cbed5247439a966b645b34eb0a2e037836ea8e",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=90cbed5247439a966b645b34eb0a2e037836ea8e"
        },
        {
          "category": "external",
          "summary": "https://kernel.dance/90cbed5247439a966b645b34eb0a2e037836ea8e",
          "url": "https://kernel.dance/90cbed5247439a966b645b34eb0a2e037836ea8e"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230731-0002/",
          "url": "https://security.netapp.com/advisory/ntap-20230731-0002/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5448",
          "url": "https://www.debian.org/security/2023/dsa-5448"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5480",
          "url": "https://www.debian.org/security/2023/dsa-5480"
        }
      ],
      "release_date": "2023-06-28T20:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-03-11T09:36:03Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161",
          "product_ids": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-2235",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation.\n\nThe perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups(), but remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability.\n\nWe recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2.\n\n",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-2235"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2"
        },
        {
          "category": "external",
          "summary": "https://kernel.dance/fd0815f632c24878e325821943edccc7fde947a2",
          "url": "https://kernel.dance/fd0815f632c24878e325821943edccc7fde947a2"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230609-0002/",
          "url": "https://security.netapp.com/advisory/ntap-20230609-0002/"
        }
      ],
      "release_date": "2023-05-01T13:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-03-11T09:36:03Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161",
          "product_ids": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-4004",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-4004"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:4961",
          "url": "https://access.redhat.com/errata/RHSA-2023:4961"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:4962",
          "url": "https://access.redhat.com/errata/RHSA-2023:4962"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:4967",
          "url": "https://access.redhat.com/errata/RHSA-2023:4967"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:5069",
          "url": "https://access.redhat.com/errata/RHSA-2023:5069"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:5091",
          "url": "https://access.redhat.com/errata/RHSA-2023:5091"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:5093",
          "url": "https://access.redhat.com/errata/RHSA-2023:5093"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:5221",
          "url": "https://access.redhat.com/errata/RHSA-2023:5221"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:5244",
          "url": "https://access.redhat.com/errata/RHSA-2023:5244"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:5255",
          "url": "https://access.redhat.com/errata/RHSA-2023:5255"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:5548",
          "url": "https://access.redhat.com/errata/RHSA-2023:5548"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:5627",
          "url": "https://access.redhat.com/errata/RHSA-2023:5627"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:7382",
          "url": "https://access.redhat.com/errata/RHSA-2023:7382"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:7389",
          "url": "https://access.redhat.com/errata/RHSA-2023:7389"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:7411",
          "url": "https://access.redhat.com/errata/RHSA-2023:7411"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:7417",
          "url": "https://access.redhat.com/errata/RHSA-2023:7417"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:7431",
          "url": "https://access.redhat.com/errata/RHSA-2023:7431"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:7434",
          "url": "https://access.redhat.com/errata/RHSA-2023:7434"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2023-4004",
          "url": "https://access.redhat.com/security/cve/CVE-2023-4004"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2225275",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2225275"
        },
        {
          "category": "external",
          "summary": "https://patchwork.ozlabs.org/project/netfilter-devel/patch/20230719190824.21196-1-fw@strlen.de/",
          "url": "https://patchwork.ozlabs.org/project/netfilter-devel/patch/20230719190824.21196-1-fw@strlen.de/"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html",
          "url": "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html",
          "url": "http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20231027-0001/",
          "url": "https://security.netapp.com/advisory/ntap-20231027-0001/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5480",
          "url": "https://www.debian.org/security/2023/dsa-5480"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5492",
          "url": "https://www.debian.org/security/2023/dsa-5492"
        }
      ],
      "release_date": "2023-07-31T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-03-11T09:36:03Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161",
          "product_ids": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-31248",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-31248"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html",
          "url": "http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html",
          "url": "http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/07/05/2",
          "url": "http://www.openwall.com/lists/oss-security/2023/07/05/2"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGZC5XOANA75OJ4XARBBXYSLDKUIJI5E/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGZC5XOANA75OJ4XARBBXYSLDKUIJI5E/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPHI46ROSSLVAV4R5LJWJYU747JGOS6D/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPHI46ROSSLVAV4R5LJWJYU747JGOS6D/"
        },
        {
          "category": "external",
          "summary": "https://lore.kernel.org/netfilter-devel/20230705121627.GC19489@breakpoint.cc/T/",
          "url": "https://lore.kernel.org/netfilter-devel/20230705121627.GC19489@breakpoint.cc/T/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20240201-0001/",
          "url": "https://security.netapp.com/advisory/ntap-20240201-0001/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5453",
          "url": "https://www.debian.org/security/2023/dsa-5453"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2023/07/05/2",
          "url": "https://www.openwall.com/lists/oss-security/2023/07/05/2"
        }
      ],
      "release_date": "2023-07-05T19:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-03-11T09:36:03Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161",
          "product_ids": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-35788",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-35788"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html",
          "url": "http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/06/17/1",
          "url": "http://www.openwall.com/lists/oss-security/2023/06/17/1"
        },
        {
          "category": "external",
          "summary": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.7",
          "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/linus/4d56304e5827c8cc8cc18c75343d283af7c4825c",
          "url": "https://git.kernel.org/linus/4d56304e5827c8cc8cc18c75343d283af7c4825c"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230714-0002/",
          "url": "https://security.netapp.com/advisory/ntap-20230714-0002/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5448",
          "url": "https://www.debian.org/security/2023/dsa-5448"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5480",
          "url": "https://www.debian.org/security/2023/dsa-5480"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2023/06/07/1",
          "url": "https://www.openwall.com/lists/oss-security/2023/06/07/1"
        }
      ],
      "release_date": "2023-06-16T21:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-03-11T09:36:03Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161",
          "product_ids": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-2124",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-2124"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/xfs/xfs_buf_item_recover.c?h=v6.4-rc1&id=22ed903eee23a5b174e240f1cdfa9acf393a5210",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/xfs/xfs_buf_item_recover.c?h=v6.4-rc1&id=22ed903eee23a5b174e240f1cdfa9acf393a5210"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230622-0010/",
          "url": "https://security.netapp.com/advisory/ntap-20230622-0010/"
        },
        {
          "category": "external",
          "summary": "https://syzkaller.appspot.com/bug?extid=7e9494b8b399902e994e",
          "url": "https://syzkaller.appspot.com/bug?extid=7e9494b8b399902e994e"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5448",
          "url": "https://www.debian.org/security/2023/dsa-5448"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5480",
          "url": "https://www.debian.org/security/2023/dsa-5480"
        }
      ],
      "release_date": "2023-05-15T22:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-03-11T09:36:03Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161",
          "product_ids": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-3776",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation.\n\nIf tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.\n\nWe recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-3776"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html",
          "url": "http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html",
          "url": "http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0323bce598eea038714f941ce2b22541c46d488f",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0323bce598eea038714f941ce2b22541c46d488f"
        },
        {
          "category": "external",
          "summary": "https://kernel.dance/0323bce598eea038714f941ce2b22541c46d488f",
          "url": "https://kernel.dance/0323bce598eea038714f941ce2b22541c46d488f"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20240202-0003/",
          "url": "https://security.netapp.com/advisory/ntap-20240202-0003/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5480",
          "url": "https://www.debian.org/security/2023/dsa-5480"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5492",
          "url": "https://www.debian.org/security/2023/dsa-5492"
        }
      ],
      "release_date": "2023-07-21T21:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-03-11T09:36:03Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161",
          "product_ids": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-4147",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the Linux kernel’s Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-4147"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:5069",
          "url": "https://access.redhat.com/errata/RHSA-2023:5069"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:5091",
          "url": "https://access.redhat.com/errata/RHSA-2023:5091"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:5093",
          "url": "https://access.redhat.com/errata/RHSA-2023:5093"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:7382",
          "url": "https://access.redhat.com/errata/RHSA-2023:7382"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:7389",
          "url": "https://access.redhat.com/errata/RHSA-2023:7389"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/errata/RHSA-2023:7411",
          "url": "https://access.redhat.com/errata/RHSA-2023:7411"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2023-4147",
          "url": "https://access.redhat.com/security/cve/CVE-2023-4147"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2225239",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2225239"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0ebc1064e4874d5987722a2ddbc18f94aa53b211",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0ebc1064e4874d5987722a2ddbc18f94aa53b211"
        },
        {
          "category": "external",
          "summary": "https://www.spinics.net/lists/stable/msg671573.html",
          "url": "https://www.spinics.net/lists/stable/msg671573.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20231020-0006/",
          "url": "https://security.netapp.com/advisory/ntap-20231020-0006/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5480",
          "url": "https://www.debian.org/security/2023/dsa-5480"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5492",
          "url": "https://www.debian.org/security/2023/dsa-5492"
        }
      ],
      "release_date": "2023-08-07T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-03-11T09:36:03Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161",
          "product_ids": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-0458",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "description",
          "text": "A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the 'rlim' variable and can be used to leak the contents. We recommend upgrading past version 6.1.8 or commit 739790605705ddcf18f21782b9c99ad7d53a8c11",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-0458"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/diff/kernel/sys.c?id=v6.1.8&id2=v6.1.7",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/diff/kernel/sys.c?id=v6.1.8&id2=v6.1.7"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/739790605705ddcf18f21782b9c99ad7d53a8c11",
          "url": "https://github.com/torvalds/linux/commit/739790605705ddcf18f21782b9c99ad7d53a8c11"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"
        }
      ],
      "release_date": "2023-04-26T19:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-03-11T09:36:03Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161",
          "product_ids": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2023-1998",
      "cwe": {
        "id": "CWE-1303",
        "name": "Non-Transparent Sharing of Microarchitectural Resources"
      },
      "notes": [
        {
          "category": "description",
          "text": "The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line.\n\nThis happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-1998"
        },
        {
          "category": "external",
          "summary": "https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crx",
          "url": "https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crx"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d",
          "url": "https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d"
        },
        {
          "category": "external",
          "summary": "https://kernel.dance/#6921ed9049bc7457f66c1596c5b78aec0dae4a9d",
          "url": "https://kernel.dance/#6921ed9049bc7457f66c1596c5b78aec0dae4a9d"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"
        }
      ],
      "release_date": "2023-04-21T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-03-11T09:36:03Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161",
          "product_ids": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2023-2194",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds write vulnerability was found in the Linux kernel's SLIMpro I2C device driver. The userspace \"data->block[0]\" variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-2194"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2188396",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188396"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/commit/92fbb6d1296f",
          "url": "https://github.com/torvalds/linux/commit/92fbb6d1296f"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html"
        }
      ],
      "release_date": "2023-04-20T21:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-03-11T09:36:03Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161",
          "product_ids": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2023-28466",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "description",
          "text": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-28466"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230427-0006/",
          "url": "https://security.netapp.com/advisory/ntap-20230427-0006/"
        }
      ],
      "release_date": "2023-03-16T00:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-03-11T09:36:03Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161",
          "product_ids": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-53179",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c\n\nThe missing IP_SET_HASH_WITH_NET0 macro in ip_set_hash_netportnet can\nlead to the use of wrong `CIDR_POS(c)` for calculating array offsets,\nwhich can lead to integer underflow. As a result, it leads to slab\nout-of-bound access.\nThis patch adds back the IP_SET_HASH_WITH_NET0 macro to\nip_set_hash_netportnet to address the issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-53179"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/050d91c03b28ca479df13dfb02bcd2c60dd6a878",
          "url": "https://git.kernel.org/stable/c/050d91c03b28ca479df13dfb02bcd2c60dd6a878"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/109e830585e89a03d554bf8ad0e668630d0a6260",
          "url": "https://git.kernel.org/stable/c/109e830585e89a03d554bf8ad0e668630d0a6260"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7935b636dd693dfe4483cfef4a1e91366c8103fa",
          "url": "https://git.kernel.org/stable/c/7935b636dd693dfe4483cfef4a1e91366c8103fa"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7ca0706c68adadf86a36b60dca090f5e9481e808",
          "url": "https://git.kernel.org/stable/c/7ca0706c68adadf86a36b60dca090f5e9481e808"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/83091f8ac03f118086596f17c9a52d31d6ca94b3",
          "url": "https://git.kernel.org/stable/c/83091f8ac03f118086596f17c9a52d31d6ca94b3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a9e6142e5f8f6ac7d1bca45c1b2b13b084ea9e14",
          "url": "https://git.kernel.org/stable/c/a9e6142e5f8f6ac7d1bca45c1b2b13b084ea9e14"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d59b6fc405549f7caf31f6aa5da1d6bef746b166",
          "url": "https://git.kernel.org/stable/c/d59b6fc405549f7caf31f6aa5da1d6bef746b166"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d95c8420efe684b964e3aa28108e9a354bcd7225",
          "url": "https://git.kernel.org/stable/c/d95c8420efe684b964e3aa28108e9a354bcd7225"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e632d09dffc68b9602d6893a99bfe3001d36cefc",
          "url": "https://git.kernel.org/stable/c/e632d09dffc68b9602d6893a99bfe3001d36cefc"
        }
      ],
      "release_date": "2025-09-15T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-03-11T09:36:03Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161",
          "product_ids": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-20593",
      "notes": [
        {
          "category": "description",
          "text": "An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-20593"
        },
        {
          "category": "external",
          "summary": "http://seclists.org/fulldisclosure/2023/Jul/43",
          "url": "http://seclists.org/fulldisclosure/2023/Jul/43"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/07/24/3",
          "url": "http://www.openwall.com/lists/oss-security/2023/07/24/3"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/07/25/1",
          "url": "http://www.openwall.com/lists/oss-security/2023/07/25/1"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/07/25/12",
          "url": "http://www.openwall.com/lists/oss-security/2023/07/25/12"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/07/25/13",
          "url": "http://www.openwall.com/lists/oss-security/2023/07/25/13"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/07/25/14",
          "url": "http://www.openwall.com/lists/oss-security/2023/07/25/14"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/07/25/15",
          "url": "http://www.openwall.com/lists/oss-security/2023/07/25/15"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/07/25/16",
          "url": "http://www.openwall.com/lists/oss-security/2023/07/25/16"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/07/25/17",
          "url": "http://www.openwall.com/lists/oss-security/2023/07/25/17"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/07/25/5",
          "url": "http://www.openwall.com/lists/oss-security/2023/07/25/5"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/07/25/6",
          "url": "http://www.openwall.com/lists/oss-security/2023/07/25/6"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/07/26/1",
          "url": "http://www.openwall.com/lists/oss-security/2023/07/26/1"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/07/31/2",
          "url": "http://www.openwall.com/lists/oss-security/2023/07/31/2"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/08/08/6",
          "url": "http://www.openwall.com/lists/oss-security/2023/08/08/6"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/08/08/7",
          "url": "http://www.openwall.com/lists/oss-security/2023/08/08/7"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/08/08/8",
          "url": "http://www.openwall.com/lists/oss-security/2023/08/08/8"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/08/16/4",
          "url": "http://www.openwall.com/lists/oss-security/2023/08/16/4"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/08/16/5",
          "url": "http://www.openwall.com/lists/oss-security/2023/08/16/5"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/09/22/11",
          "url": "http://www.openwall.com/lists/oss-security/2023/09/22/11"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/09/22/9",
          "url": "http://www.openwall.com/lists/oss-security/2023/09/22/9"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/09/25/4",
          "url": "http://www.openwall.com/lists/oss-security/2023/09/25/4"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/09/25/7",
          "url": "http://www.openwall.com/lists/oss-security/2023/09/25/7"
        },
        {
          "category": "external",
          "summary": "http://xenbits.xen.org/xsa/advisory-433.html",
          "url": "http://xenbits.xen.org/xsa/advisory-433.html"
        },
        {
          "category": "external",
          "summary": "https://cmpxchg8b.com/zenbleed.html",
          "url": "https://cmpxchg8b.com/zenbleed.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20240531-0004/",
          "url": "https://security.netapp.com/advisory/ntap-20240531-0004/"
        },
        {
          "category": "external",
          "summary": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008",
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5459",
          "url": "https://www.debian.org/security/2023/dsa-5459"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5461",
          "url": "https://www.debian.org/security/2023/dsa-5461"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5462",
          "url": "https://www.debian.org/security/2023/dsa-5462"
        }
      ],
      "release_date": "2023-07-24T20:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-03-11T09:36:03Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161",
          "product_ids": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2023-2002",
      "cwe": {
        "id": "CWE-250",
        "name": "Execution with Unnecessary Privileges"
      },
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-2002"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20240202-0004/",
          "url": "https://security.netapp.com/advisory/ntap-20240202-0004/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5480",
          "url": "https://www.debian.org/security/2023/dsa-5480"
        },
        {
          "category": "external",
          "summary": "https://www.openwall.com/lists/oss-security/2023/04/16/3",
          "url": "https://www.openwall.com/lists/oss-security/2023/04/16/3"
        }
      ],
      "release_date": "2023-05-26T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-03-11T09:36:03Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161",
          "product_ids": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2023-3390",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c.\n\nMishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.\n\nWe recommend upgrading past commit 1240eb93f0616b21c675416516ff3d74798fdc97.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
          "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
          "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-3390"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html",
          "url": "http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1240eb93f0616b21c675416516ff3d74798fdc97",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1240eb93f0616b21c675416516ff3d74798fdc97"
        },
        {
          "category": "external",
          "summary": "https://kernel.dance/1240eb93f0616b21c675416516ff3d74798fdc97",
          "url": "https://kernel.dance/1240eb93f0616b21c675416516ff3d74798fdc97"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20230818-0004/",
          "url": "https://security.netapp.com/advisory/ntap-20230818-0004/"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5448",
          "url": "https://www.debian.org/security/2023/dsa-5448"
        },
        {
          "category": "external",
          "summary": "https://www.debian.org/security/2023/dsa-5461",
          "url": "https://www.debian.org/security/2023/dsa-5461"
        }
      ],
      "release_date": "2023-06-28T21:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-03-11T09:36:03Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161",
          "product_ids": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2024:1710164161"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:bpftool-0:7.0.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-abi-stablelists-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-cross-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-debug-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-devel-matched-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-doc-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.noarch",
            "AlmaLinux-9.2:kernel-headers-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-ipaclones-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-core-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-extra-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-modules-partner-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-selftests-internal-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-tools-libs-devel-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:kernel-uki-virt-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:python3-perf-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64",
            "AlmaLinux-9.2:rtla-0:5.14.0-284.11.1.el9_2.tuxcare.5.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}