{
  "document" : {
    "aggregate_severity" : {
      "namespace" : "https://access.redhat.com/security/updates/classification/",
      "text" : "Moderate"
    },
    "category" : "csaf_security_advisory",
    "csaf_version" : "2.0",
    "distribution" : {
      "text" : "Copyright © Red Hat, Inc. All rights reserved.",
      "tlp" : {
        "label" : "WHITE",
        "url" : "https://www.first.org/tlp/"
      }
    },
    "lang" : "en",
    "notes" : [ {
      "category" : "summary",
      "text" : "An update for kernel is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
      "title" : "Topic"
    }, {
      "category" : "general",
      "text" : "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: smc: Fix use-after-free in __pnet_find_base_ndev() (CVE-2025-40064)\n\n* kernel: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (CVE-2025-40168)\n\n* kernel: net/sched: cls_u32: use skb_header_pointer_careful() (CVE-2026-23204)\n\n* kernel: kernel: Privilege escalation or denial of service via use-after-free in nf_tables_addchain() (CVE-2026-23231)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
      "title" : "Details"
    }, {
      "category" : "legal_disclaimer",
      "text" : "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
      "title" : "Terms of Use"
    } ],
    "publisher" : {
      "category" : "vendor",
      "contact_details" : "https://access.redhat.com/security/team/contact/",
      "issuing_authority" : "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name" : "Red Hat Product Security",
      "namespace" : "https://www.redhat.com"
    },
    "references" : [ {
      "category" : "self",
      "summary" : "https://access.redhat.com/errata/RHSA-2026:9513",
      "url" : "https://access.redhat.com/errata/RHSA-2026:9513"
    }, {
      "category" : "external",
      "summary" : "https://access.redhat.com/security/updates/classification/#moderate",
      "url" : "https://access.redhat.com/security/updates/classification/#moderate"
    }, {
      "category" : "external",
      "summary" : "2406747",
      "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2406747"
    }, {
      "category" : "external",
      "summary" : "2414482",
      "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2414482"
    }, {
      "category" : "external",
      "summary" : "2439931",
      "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2439931"
    }, {
      "category" : "external",
      "summary" : "2444376",
      "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2444376"
    }, {
      "category" : "self",
      "summary" : "Canonical URL",
      "url" : "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_9513.json"
    } ],
    "title" : "Red Hat Security Advisory: kernel security update",
    "tracking" : {
      "current_release_date" : "2026-04-27T14:23:16+00:00",
      "generator" : {
        "date" : "2026-04-27T14:23:16+00:00",
        "engine" : {
          "name" : "Red Hat SDEngine",
          "version" : "4.7.5"
        }
      },
      "id" : "RHSA-2026:9513",
      "initial_release_date" : "2026-04-22T00:13:56+00:00",
      "revision_history" : [ {
        "date" : "2026-04-22T00:13:56+00:00",
        "number" : "1",
        "summary" : "Initial version"
      }, {
        "date" : "2026-04-22T00:13:56+00:00",
        "number" : "2",
        "summary" : "Last updated version"
      }, {
        "date" : "2026-04-27T14:23:16+00:00",
        "number" : "3",
        "summary" : "Last generated version"
      } ],
      "status" : "final",
      "version" : "3"
    }
  },
  "product_tree" : {
    "branches" : [ {
      "branches" : [ {
        "branches" : [ {
          "category" : "product_name",
          "name" : "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
          "product" : {
            "name" : "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
            "product_id" : "BaseOS-8.2.0.Z.AUS",
            "product_identification_helper" : {
              "cpe" : "cpe:/o:redhat:rhel_aus:8.2::baseos"
            }
          }
        } ],
        "category" : "product_family",
        "name" : "Red Hat Enterprise Linux"
      }, {
        "branches" : [ {
          "category" : "product_version",
          "name" : "bpftool-0:4.18.0-193.195.1.el8_2.x86_64",
          "product" : {
            "name" : "bpftool-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_id" : "bpftool-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_identification_helper" : {
              "purl" : "pkg:rpm/redhat/bpftool@4.18.0-193.195.1.el8_2?arch=x86_64"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "kernel-0:4.18.0-193.195.1.el8_2.x86_64",
          "product" : {
            "name" : "kernel-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_id" : "kernel-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_identification_helper" : {
              "purl" : "pkg:rpm/redhat/kernel@4.18.0-193.195.1.el8_2?arch=x86_64"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "kernel-core-0:4.18.0-193.195.1.el8_2.x86_64",
          "product" : {
            "name" : "kernel-core-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_id" : "kernel-core-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_identification_helper" : {
              "purl" : "pkg:rpm/redhat/kernel-core@4.18.0-193.195.1.el8_2?arch=x86_64"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "kernel-debug-0:4.18.0-193.195.1.el8_2.x86_64",
          "product" : {
            "name" : "kernel-debug-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_id" : "kernel-debug-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_identification_helper" : {
              "purl" : "pkg:rpm/redhat/kernel-debug@4.18.0-193.195.1.el8_2?arch=x86_64"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "kernel-debug-core-0:4.18.0-193.195.1.el8_2.x86_64",
          "product" : {
            "name" : "kernel-debug-core-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_id" : "kernel-debug-core-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_identification_helper" : {
              "purl" : "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.195.1.el8_2?arch=x86_64"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "kernel-debug-devel-0:4.18.0-193.195.1.el8_2.x86_64",
          "product" : {
            "name" : "kernel-debug-devel-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_id" : "kernel-debug-devel-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_identification_helper" : {
              "purl" : "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.195.1.el8_2?arch=x86_64"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "kernel-debug-modules-0:4.18.0-193.195.1.el8_2.x86_64",
          "product" : {
            "name" : "kernel-debug-modules-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_id" : "kernel-debug-modules-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_identification_helper" : {
              "purl" : "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.195.1.el8_2?arch=x86_64"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "kernel-debug-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64",
          "product" : {
            "name" : "kernel-debug-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_id" : "kernel-debug-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_identification_helper" : {
              "purl" : "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.195.1.el8_2?arch=x86_64"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "kernel-devel-0:4.18.0-193.195.1.el8_2.x86_64",
          "product" : {
            "name" : "kernel-devel-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_id" : "kernel-devel-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_identification_helper" : {
              "purl" : "pkg:rpm/redhat/kernel-devel@4.18.0-193.195.1.el8_2?arch=x86_64"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "kernel-modules-0:4.18.0-193.195.1.el8_2.x86_64",
          "product" : {
            "name" : "kernel-modules-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_id" : "kernel-modules-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_identification_helper" : {
              "purl" : "pkg:rpm/redhat/kernel-modules@4.18.0-193.195.1.el8_2?arch=x86_64"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "kernel-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64",
          "product" : {
            "name" : "kernel-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_id" : "kernel-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_identification_helper" : {
              "purl" : "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.195.1.el8_2?arch=x86_64"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "kernel-tools-0:4.18.0-193.195.1.el8_2.x86_64",
          "product" : {
            "name" : "kernel-tools-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_id" : "kernel-tools-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_identification_helper" : {
              "purl" : "pkg:rpm/redhat/kernel-tools@4.18.0-193.195.1.el8_2?arch=x86_64"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "kernel-tools-libs-0:4.18.0-193.195.1.el8_2.x86_64",
          "product" : {
            "name" : "kernel-tools-libs-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_id" : "kernel-tools-libs-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_identification_helper" : {
              "purl" : "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.195.1.el8_2?arch=x86_64"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "perf-0:4.18.0-193.195.1.el8_2.x86_64",
          "product" : {
            "name" : "perf-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_id" : "perf-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_identification_helper" : {
              "purl" : "pkg:rpm/redhat/perf@4.18.0-193.195.1.el8_2?arch=x86_64"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "python3-perf-0:4.18.0-193.195.1.el8_2.x86_64",
          "product" : {
            "name" : "python3-perf-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_id" : "python3-perf-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_identification_helper" : {
              "purl" : "pkg:rpm/redhat/python3-perf@4.18.0-193.195.1.el8_2?arch=x86_64"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "bpftool-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64",
          "product" : {
            "name" : "bpftool-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_id" : "bpftool-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_identification_helper" : {
              "purl" : "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.195.1.el8_2?arch=x86_64"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "kernel-debug-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64",
          "product" : {
            "name" : "kernel-debug-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_id" : "kernel-debug-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_identification_helper" : {
              "purl" : "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.195.1.el8_2?arch=x86_64"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "kernel-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64",
          "product" : {
            "name" : "kernel-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_id" : "kernel-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_identification_helper" : {
              "purl" : "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.195.1.el8_2?arch=x86_64"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "kernel-debuginfo-common-x86_64-0:4.18.0-193.195.1.el8_2.x86_64",
          "product" : {
            "name" : "kernel-debuginfo-common-x86_64-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_id" : "kernel-debuginfo-common-x86_64-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_identification_helper" : {
              "purl" : "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.195.1.el8_2?arch=x86_64"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "kernel-tools-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64",
          "product" : {
            "name" : "kernel-tools-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_id" : "kernel-tools-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_identification_helper" : {
              "purl" : "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.195.1.el8_2?arch=x86_64"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64",
          "product" : {
            "name" : "perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_id" : "perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_identification_helper" : {
              "purl" : "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.195.1.el8_2?arch=x86_64"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "python3-perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64",
          "product" : {
            "name" : "python3-perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_id" : "python3-perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64",
            "product_identification_helper" : {
              "purl" : "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.195.1.el8_2?arch=x86_64"
            }
          }
        } ],
        "category" : "architecture",
        "name" : "x86_64"
      }, {
        "branches" : [ {
          "category" : "product_version",
          "name" : "kernel-0:4.18.0-193.195.1.el8_2.src",
          "product" : {
            "name" : "kernel-0:4.18.0-193.195.1.el8_2.src",
            "product_id" : "kernel-0:4.18.0-193.195.1.el8_2.src",
            "product_identification_helper" : {
              "purl" : "pkg:rpm/redhat/kernel@4.18.0-193.195.1.el8_2?arch=src"
            }
          }
        } ],
        "category" : "architecture",
        "name" : "src"
      }, {
        "branches" : [ {
          "category" : "product_version",
          "name" : "kernel-abi-whitelists-0:4.18.0-193.195.1.el8_2.noarch",
          "product" : {
            "name" : "kernel-abi-whitelists-0:4.18.0-193.195.1.el8_2.noarch",
            "product_id" : "kernel-abi-whitelists-0:4.18.0-193.195.1.el8_2.noarch",
            "product_identification_helper" : {
              "purl" : "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.195.1.el8_2?arch=noarch"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "kernel-doc-0:4.18.0-193.195.1.el8_2.noarch",
          "product" : {
            "name" : "kernel-doc-0:4.18.0-193.195.1.el8_2.noarch",
            "product_id" : "kernel-doc-0:4.18.0-193.195.1.el8_2.noarch",
            "product_identification_helper" : {
              "purl" : "pkg:rpm/redhat/kernel-doc@4.18.0-193.195.1.el8_2?arch=noarch"
            }
          }
        } ],
        "category" : "architecture",
        "name" : "noarch"
      } ],
      "category" : "vendor",
      "name" : "Red Hat"
    } ],
    "relationships" : [ {
      "category" : "default_component_of",
      "full_product_name" : {
        "name" : "bpftool-0:4.18.0-193.195.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
        "product_id" : "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.195.1.el8_2.x86_64"
      },
      "product_reference" : "bpftool-0:4.18.0-193.195.1.el8_2.x86_64",
      "relates_to_product_reference" : "BaseOS-8.2.0.Z.AUS"
    }, {
      "category" : "default_component_of",
      "full_product_name" : {
        "name" : "bpftool-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
        "product_id" : "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64"
      },
      "product_reference" : "bpftool-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64",
      "relates_to_product_reference" : "BaseOS-8.2.0.Z.AUS"
    }, {
      "category" : "default_component_of",
      "full_product_name" : {
        "name" : "kernel-0:4.18.0-193.195.1.el8_2.src as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
        "product_id" : "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.src"
      },
      "product_reference" : "kernel-0:4.18.0-193.195.1.el8_2.src",
      "relates_to_product_reference" : "BaseOS-8.2.0.Z.AUS"
    }, {
      "category" : "default_component_of",
      "full_product_name" : {
        "name" : "kernel-0:4.18.0-193.195.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
        "product_id" : "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.x86_64"
      },
      "product_reference" : "kernel-0:4.18.0-193.195.1.el8_2.x86_64",
      "relates_to_product_reference" : "BaseOS-8.2.0.Z.AUS"
    }, {
      "category" : "default_component_of",
      "full_product_name" : {
        "name" : "kernel-abi-whitelists-0:4.18.0-193.195.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
        "product_id" : "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.195.1.el8_2.noarch"
      },
      "product_reference" : "kernel-abi-whitelists-0:4.18.0-193.195.1.el8_2.noarch",
      "relates_to_product_reference" : "BaseOS-8.2.0.Z.AUS"
    }, {
      "category" : "default_component_of",
      "full_product_name" : {
        "name" : "kernel-core-0:4.18.0-193.195.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
        "product_id" : "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.195.1.el8_2.x86_64"
      },
      "product_reference" : "kernel-core-0:4.18.0-193.195.1.el8_2.x86_64",
      "relates_to_product_reference" : "BaseOS-8.2.0.Z.AUS"
    }, {
      "category" : "default_component_of",
      "full_product_name" : {
        "name" : "kernel-debug-0:4.18.0-193.195.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
        "product_id" : "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.195.1.el8_2.x86_64"
      },
      "product_reference" : "kernel-debug-0:4.18.0-193.195.1.el8_2.x86_64",
      "relates_to_product_reference" : "BaseOS-8.2.0.Z.AUS"
    }, {
      "category" : "default_component_of",
      "full_product_name" : {
        "name" : "kernel-debug-core-0:4.18.0-193.195.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
        "product_id" : "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.195.1.el8_2.x86_64"
      },
      "product_reference" : "kernel-debug-core-0:4.18.0-193.195.1.el8_2.x86_64",
      "relates_to_product_reference" : "BaseOS-8.2.0.Z.AUS"
    }, {
      "category" : "default_component_of",
      "full_product_name" : {
        "name" : "kernel-debug-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
        "product_id" : "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64"
      },
      "product_reference" : "kernel-debug-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64",
      "relates_to_product_reference" : "BaseOS-8.2.0.Z.AUS"
    }, {
      "category" : "default_component_of",
      "full_product_name" : {
        "name" : "kernel-debug-devel-0:4.18.0-193.195.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
        "product_id" : "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.195.1.el8_2.x86_64"
      },
      "product_reference" : "kernel-debug-devel-0:4.18.0-193.195.1.el8_2.x86_64",
      "relates_to_product_reference" : "BaseOS-8.2.0.Z.AUS"
    }, {
      "category" : "default_component_of",
      "full_product_name" : {
        "name" : "kernel-debug-modules-0:4.18.0-193.195.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
        "product_id" : "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.195.1.el8_2.x86_64"
      },
      "product_reference" : "kernel-debug-modules-0:4.18.0-193.195.1.el8_2.x86_64",
      "relates_to_product_reference" : "BaseOS-8.2.0.Z.AUS"
    }, {
      "category" : "default_component_of",
      "full_product_name" : {
        "name" : "kernel-debug-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
        "product_id" : "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64"
      },
      "product_reference" : "kernel-debug-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64",
      "relates_to_product_reference" : "BaseOS-8.2.0.Z.AUS"
    }, {
      "category" : "default_component_of",
      "full_product_name" : {
        "name" : "kernel-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
        "product_id" : "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64"
      },
      "product_reference" : "kernel-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64",
      "relates_to_product_reference" : "BaseOS-8.2.0.Z.AUS"
    }, {
      "category" : "default_component_of",
      "full_product_name" : {
        "name" : "kernel-debuginfo-common-x86_64-0:4.18.0-193.195.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
        "product_id" : "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.195.1.el8_2.x86_64"
      },
      "product_reference" : "kernel-debuginfo-common-x86_64-0:4.18.0-193.195.1.el8_2.x86_64",
      "relates_to_product_reference" : "BaseOS-8.2.0.Z.AUS"
    }, {
      "category" : "default_component_of",
      "full_product_name" : {
        "name" : "kernel-devel-0:4.18.0-193.195.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
        "product_id" : "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.195.1.el8_2.x86_64"
      },
      "product_reference" : "kernel-devel-0:4.18.0-193.195.1.el8_2.x86_64",
      "relates_to_product_reference" : "BaseOS-8.2.0.Z.AUS"
    }, {
      "category" : "default_component_of",
      "full_product_name" : {
        "name" : "kernel-doc-0:4.18.0-193.195.1.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
        "product_id" : "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.195.1.el8_2.noarch"
      },
      "product_reference" : "kernel-doc-0:4.18.0-193.195.1.el8_2.noarch",
      "relates_to_product_reference" : "BaseOS-8.2.0.Z.AUS"
    }, {
      "category" : "default_component_of",
      "full_product_name" : {
        "name" : "kernel-modules-0:4.18.0-193.195.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
        "product_id" : "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.195.1.el8_2.x86_64"
      },
      "product_reference" : "kernel-modules-0:4.18.0-193.195.1.el8_2.x86_64",
      "relates_to_product_reference" : "BaseOS-8.2.0.Z.AUS"
    }, {
      "category" : "default_component_of",
      "full_product_name" : {
        "name" : "kernel-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
        "product_id" : "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64"
      },
      "product_reference" : "kernel-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64",
      "relates_to_product_reference" : "BaseOS-8.2.0.Z.AUS"
    }, {
      "category" : "default_component_of",
      "full_product_name" : {
        "name" : "kernel-tools-0:4.18.0-193.195.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
        "product_id" : "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.195.1.el8_2.x86_64"
      },
      "product_reference" : "kernel-tools-0:4.18.0-193.195.1.el8_2.x86_64",
      "relates_to_product_reference" : "BaseOS-8.2.0.Z.AUS"
    }, {
      "category" : "default_component_of",
      "full_product_name" : {
        "name" : "kernel-tools-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
        "product_id" : "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64"
      },
      "product_reference" : "kernel-tools-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64",
      "relates_to_product_reference" : "BaseOS-8.2.0.Z.AUS"
    }, {
      "category" : "default_component_of",
      "full_product_name" : {
        "name" : "kernel-tools-libs-0:4.18.0-193.195.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
        "product_id" : "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.195.1.el8_2.x86_64"
      },
      "product_reference" : "kernel-tools-libs-0:4.18.0-193.195.1.el8_2.x86_64",
      "relates_to_product_reference" : "BaseOS-8.2.0.Z.AUS"
    }, {
      "category" : "default_component_of",
      "full_product_name" : {
        "name" : "perf-0:4.18.0-193.195.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
        "product_id" : "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.195.1.el8_2.x86_64"
      },
      "product_reference" : "perf-0:4.18.0-193.195.1.el8_2.x86_64",
      "relates_to_product_reference" : "BaseOS-8.2.0.Z.AUS"
    }, {
      "category" : "default_component_of",
      "full_product_name" : {
        "name" : "perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
        "product_id" : "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64"
      },
      "product_reference" : "perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64",
      "relates_to_product_reference" : "BaseOS-8.2.0.Z.AUS"
    }, {
      "category" : "default_component_of",
      "full_product_name" : {
        "name" : "python3-perf-0:4.18.0-193.195.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
        "product_id" : "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.195.1.el8_2.x86_64"
      },
      "product_reference" : "python3-perf-0:4.18.0-193.195.1.el8_2.x86_64",
      "relates_to_product_reference" : "BaseOS-8.2.0.Z.AUS"
    }, {
      "category" : "default_component_of",
      "full_product_name" : {
        "name" : "python3-perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
        "product_id" : "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64"
      },
      "product_reference" : "python3-perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64",
      "relates_to_product_reference" : "BaseOS-8.2.0.Z.AUS"
    } ]
  },
  "vulnerabilities" : [ {
    "cve" : "CVE-2025-40064",
    "cwe" : {
      "id" : "CWE-825",
      "name" : "Expired Pointer Dereference"
    },
    "discovery_date" : "2025-10-28T00:00:00+00:00",
    "ids" : [ {
      "system_name" : "Red Hat Bugzilla ID",
      "text" : "2406747"
    } ],
    "notes" : [ {
      "category" : "description",
      "text" : "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in __pnet_find_base_ndev().\n\nsyzbot reported use-after-free of net_device in __pnet_find_base_ndev(),\nwhich was called during connect(). [0]\n\nsmc_pnet_find_ism_resource() fetches sk_dst_get(sk)->dev and passes\ndown to pnet_find_base_ndev(), where RTNL is held.  Then, UAF happened\nat __pnet_find_base_ndev() when the dev is first used.\n\nThis means dev had already been freed before acquiring RTNL in\npnet_find_base_ndev().\n\nWhile dev is going away, dst->dev could be swapped with blackhole_netdev,\nand the dev's refcnt by dst will be released.\n\nWe must hold dev's refcnt before calling smc_pnet_find_ism_resource().\n\nAlso, smc_pnet_find_roce_resource() has the same problem.\n\nLet's use __sk_dst_get() and dst_dev_rcu() in the two functions.\n\n[0]:\nBUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\nRead of size 1 at addr ffff888036bac33a by task syz.0.3632/18609\n\nCPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nCall Trace:\n <TASK>\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926\n pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]\n smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]\n smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154\n smc_find_ism_device net/smc/af_smc.c:1030 [inline]\n smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]\n __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545\n smc_connect+0x877/0xd90 net/smc/af_smc.c:1715\n __sys_connect_file net/socket.c:2086 [inline]\n __sys_connect+0x313/0x440 net/socket.c:2105\n __do_sys_connect net/socket.c:2111 [inline]\n __se_sys_connect net/socket.c:2108 [inline]\n __x64_sys_connect+0x7a/0x90 net/socket.c:2108\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f47cbf8eba9\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9\nRDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b\nRBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8\n </TASK>\n\nThe buggy address belongs to the physical page:\npage: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac\nflags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)\nraw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000\nraw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as freed\npage last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466\n set_page_owner include/linux/page_owner.h:32 [inline]\n post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851\n prep_new_page mm/page_alloc.c:1859 [inline]\n get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858\n __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148\n alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416\n ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317\n __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348\n __do_kmalloc_node mm/slub.c:4364 [inline]\n __kvmalloc_node\n---truncated---",
      "title" : "Vulnerability description"
    }, {
      "category" : "summary",
      "text" : "kernel: smc: Fix use-after-free in __pnet_find_base_ndev()",
      "title" : "Vulnerability summary"
    }, {
      "category" : "general",
      "text" : "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
      "title" : "CVSS score applicability"
    } ],
    "product_status" : {
      "fixed" : [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64" ]
    },
    "references" : [ {
      "category" : "self",
      "summary" : "Canonical URL",
      "url" : "https://access.redhat.com/security/cve/CVE-2025-40064"
    }, {
      "category" : "external",
      "summary" : "RHBZ#2406747",
      "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2406747"
    }, {
      "category" : "external",
      "summary" : "https://www.cve.org/CVERecord?id=CVE-2025-40064",
      "url" : "https://www.cve.org/CVERecord?id=CVE-2025-40064"
    }, {
      "category" : "external",
      "summary" : "https://nvd.nist.gov/vuln/detail/CVE-2025-40064",
      "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-40064"
    }, {
      "category" : "external",
      "summary" : "https://lore.kernel.org/linux-cve-announce/2025102817-CVE-2025-40064-0c16@gregkh/T",
      "url" : "https://lore.kernel.org/linux-cve-announce/2025102817-CVE-2025-40064-0c16@gregkh/T"
    } ],
    "release_date" : "2025-10-28T00:00:00+00:00",
    "remediations" : [ {
      "category" : "vendor_fix",
      "date" : "2026-04-22T00:13:56+00:00",
      "details" : "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
      "product_ids" : [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64" ],
      "restart_required" : {
        "category" : "machine"
      },
      "url" : "https://access.redhat.com/errata/RHSA-2026:9513"
    } ],
    "scores" : [ {
      "cvss_v3" : {
        "attackComplexity" : "LOW",
        "attackVector" : "LOCAL",
        "availabilityImpact" : "HIGH",
        "baseScore" : 7.1,
        "baseSeverity" : "HIGH",
        "confidentialityImpact" : "HIGH",
        "integrityImpact" : "NONE",
        "privilegesRequired" : "LOW",
        "scope" : "UNCHANGED",
        "userInteraction" : "NONE",
        "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
        "version" : "3.1"
      },
      "products" : [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64" ]
    } ],
    "threats" : [ {
      "category" : "impact",
      "details" : "Moderate"
    } ],
    "title" : "kernel: smc: Fix use-after-free in __pnet_find_base_ndev()"
  }, {
    "cve" : "CVE-2025-40168",
    "cwe" : {
      "id" : "CWE-416",
      "name" : "Use After Free"
    },
    "discovery_date" : "2025-11-12T00:00:00+00:00",
    "ids" : [ {
      "system_name" : "Red Hat Bugzilla ID",
      "text" : "2414482"
    } ],
    "notes" : [ {
      "category" : "description",
      "text" : "A flaw was found in the Linux kernel’s SMC (Shared Memory Communication) module: in smc_clc_prfx_match(), the function is called from smc_listen_work() without proper RCU or RTNL protection. The code previously used sk_dst_get(sk)->dev, which can lead to a use-after-free (UAF) condition if the sk’s destination is freed concurrently.",
      "title" : "Vulnerability description"
    }, {
      "category" : "summary",
      "text" : "kernel: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match()",
      "title" : "Vulnerability summary"
    }, {
      "category" : "general",
      "text" : "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
      "title" : "CVSS score applicability"
    } ],
    "product_status" : {
      "fixed" : [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64" ]
    },
    "references" : [ {
      "category" : "self",
      "summary" : "Canonical URL",
      "url" : "https://access.redhat.com/security/cve/CVE-2025-40168"
    }, {
      "category" : "external",
      "summary" : "RHBZ#2414482",
      "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2414482"
    }, {
      "category" : "external",
      "summary" : "https://www.cve.org/CVERecord?id=CVE-2025-40168",
      "url" : "https://www.cve.org/CVERecord?id=CVE-2025-40168"
    }, {
      "category" : "external",
      "summary" : "https://nvd.nist.gov/vuln/detail/CVE-2025-40168",
      "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-40168"
    }, {
      "category" : "external",
      "summary" : "https://lore.kernel.org/linux-cve-announce/2025111256-CVE-2025-40168-bdd5@gregkh/T",
      "url" : "https://lore.kernel.org/linux-cve-announce/2025111256-CVE-2025-40168-bdd5@gregkh/T"
    } ],
    "release_date" : "2025-11-12T00:00:00+00:00",
    "remediations" : [ {
      "category" : "vendor_fix",
      "date" : "2026-04-22T00:13:56+00:00",
      "details" : "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
      "product_ids" : [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64" ],
      "restart_required" : {
        "category" : "machine"
      },
      "url" : "https://access.redhat.com/errata/RHSA-2026:9513"
    }, {
      "category" : "workaround",
      "details" : "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
      "product_ids" : [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64" ]
    } ],
    "scores" : [ {
      "cvss_v3" : {
        "attackComplexity" : "HIGH",
        "attackVector" : "LOCAL",
        "availabilityImpact" : "HIGH",
        "baseScore" : 7.0,
        "baseSeverity" : "HIGH",
        "confidentialityImpact" : "HIGH",
        "integrityImpact" : "HIGH",
        "privilegesRequired" : "LOW",
        "scope" : "UNCHANGED",
        "userInteraction" : "NONE",
        "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
        "version" : "3.1"
      },
      "products" : [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64" ]
    } ],
    "threats" : [ {
      "category" : "impact",
      "details" : "Moderate"
    } ],
    "title" : "kernel: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match()"
  }, {
    "cve" : "CVE-2026-23204",
    "cwe" : {
      "id" : "CWE-1285",
      "name" : "Improper Validation of Specified Index, Position, or Offset in Input"
    },
    "discovery_date" : "2026-02-14T00:00:00+00:00",
    "ids" : [ {
      "system_name" : "Red Hat Bugzilla ID",
      "text" : "2439931"
    } ],
    "notes" : [ {
      "category" : "description",
      "text" : "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: cls_u32: use skb_header_pointer_careful()\n\nskb_header_pointer() does not fully validate negative @offset values.\n\nUse skb_header_pointer_careful() instead.\n\nGangMin Kim provided a report and a repro fooling u32_classify():\n\nBUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0\nnet/sched/cls_u32.c:221",
      "title" : "Vulnerability description"
    }, {
      "category" : "summary",
      "text" : "kernel: net/sched: cls_u32: use skb_header_pointer_careful()",
      "title" : "Vulnerability summary"
    }, {
      "category" : "other",
      "text" : "An out of bounds memory access vulnerability exists in the Linux traffic control u32 classifier implementation. In u32_classify the kernel calculates offsets such as toff using key off values masks and variable offsets and then dereferences packet data using skb_header_pointer. The helper skb_header_pointer does not fully validate negative offset values. With a crafted configuration and packet layout the computed offset can become negative or otherwise invalid in a way that bypasses the existing checks and results in an out of bounds access. The most direct impact is a kernel crash causing a denial of service. Because the access pattern involves reading packet data at attacker influenced offsets it may also allow information disclosure of adjacent kernel memory and in worst cases could contribute to privilege escalation chains. Exploitation prerequisites depend on whether the system has tc u32 filters configured on a traffic path. For the CVSS the base score uses PR:L because configuring tc filters typically requires elevated privileges but can be available in containers or network namespaces with CAP_NET_ADMIN.",
      "title" : "Statement"
    }, {
      "category" : "general",
      "text" : "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
      "title" : "CVSS score applicability"
    } ],
    "product_status" : {
      "fixed" : [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64" ]
    },
    "references" : [ {
      "category" : "self",
      "summary" : "Canonical URL",
      "url" : "https://access.redhat.com/security/cve/CVE-2026-23204"
    }, {
      "category" : "external",
      "summary" : "RHBZ#2439931",
      "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2439931"
    }, {
      "category" : "external",
      "summary" : "https://www.cve.org/CVERecord?id=CVE-2026-23204",
      "url" : "https://www.cve.org/CVERecord?id=CVE-2026-23204"
    }, {
      "category" : "external",
      "summary" : "https://nvd.nist.gov/vuln/detail/CVE-2026-23204",
      "url" : "https://nvd.nist.gov/vuln/detail/CVE-2026-23204"
    }, {
      "category" : "external",
      "summary" : "https://lore.kernel.org/linux-cve-announce/2026021437-CVE-2026-23204-be85@gregkh/T",
      "url" : "https://lore.kernel.org/linux-cve-announce/2026021437-CVE-2026-23204-be85@gregkh/T"
    } ],
    "release_date" : "2026-02-14T00:00:00+00:00",
    "remediations" : [ {
      "category" : "vendor_fix",
      "date" : "2026-04-22T00:13:56+00:00",
      "details" : "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
      "product_ids" : [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64" ],
      "restart_required" : {
        "category" : "machine"
      },
      "url" : "https://access.redhat.com/errata/RHSA-2026:9513"
    } ],
    "scores" : [ {
      "cvss_v3" : {
        "attackComplexity" : "LOW",
        "attackVector" : "LOCAL",
        "availabilityImpact" : "HIGH",
        "baseScore" : 7.3,
        "baseSeverity" : "HIGH",
        "confidentialityImpact" : "HIGH",
        "integrityImpact" : "LOW",
        "privilegesRequired" : "LOW",
        "scope" : "UNCHANGED",
        "userInteraction" : "NONE",
        "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
        "version" : "3.1"
      },
      "products" : [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64" ]
    } ],
    "threats" : [ {
      "category" : "impact",
      "details" : "Moderate"
    } ],
    "title" : "kernel: net/sched: cls_u32: use skb_header_pointer_careful()"
  }, {
    "cve" : "CVE-2026-23231",
    "cwe" : {
      "id" : "CWE-416",
      "name" : "Use After Free"
    },
    "discovery_date" : "2026-03-04T00:00:00+00:00",
    "ids" : [ {
      "system_name" : "Red Hat Bugzilla ID",
      "text" : "2444376"
    } ],
    "notes" : [ {
      "category" : "description",
      "text" : "A flaw was found in the Linux kernel. A local attacker with CAP_NET_ADMIN capabilities, or remote packet traffic, could exploit a use-after-free vulnerability in the nf_tables_addchain() function's error handling. Successful exploitation could lead to a kernel crash, resulting in a Denial of Service (DoS), or potentially privilege escalation.",
      "title" : "Vulnerability description"
    }, {
      "category" : "summary",
      "text" : "kernel: kernel: Privilege escalation or denial of service via use-after-free in nf_tables_addchain()",
      "title" : "Vulnerability summary"
    }, {
      "category" : "other",
      "text" : "A use after free can occur in nf_tables_addchain error handling because a new chain is published to table chains via RCU before hook registration completes and is then freed without an RCU grace period when hook registration fails. This creates a race with RCU readers in the control plane such as nf_tables_dump_chains and also with in flight packet evaluation when an IPv4 hook is transiently installed for NFPROTO_INET and later IPv6 hook registration fails. For the CVSS the PR is L because a local actor with CAP_NET_ADMIN can induce the failing add chain path while remote packet traffic may hit the transient hook and trigger the UAF window. Impact ranges from a kernel crash to potential privilege escalation.",
      "title" : "Statement"
    }, {
      "category" : "general",
      "text" : "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
      "title" : "CVSS score applicability"
    } ],
    "product_status" : {
      "fixed" : [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64" ]
    },
    "references" : [ {
      "category" : "self",
      "summary" : "Canonical URL",
      "url" : "https://access.redhat.com/security/cve/CVE-2026-23231"
    }, {
      "category" : "external",
      "summary" : "RHBZ#2444376",
      "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2444376"
    }, {
      "category" : "external",
      "summary" : "https://www.cve.org/CVERecord?id=CVE-2026-23231",
      "url" : "https://www.cve.org/CVERecord?id=CVE-2026-23231"
    }, {
      "category" : "external",
      "summary" : "https://nvd.nist.gov/vuln/detail/CVE-2026-23231",
      "url" : "https://nvd.nist.gov/vuln/detail/CVE-2026-23231"
    }, {
      "category" : "external",
      "summary" : "https://lore.kernel.org/linux-cve-announce/2026030436-CVE-2026-23231-1a96@gregkh/T",
      "url" : "https://lore.kernel.org/linux-cve-announce/2026030436-CVE-2026-23231-1a96@gregkh/T"
    } ],
    "release_date" : "2026-03-04T00:00:00+00:00",
    "remediations" : [ {
      "category" : "vendor_fix",
      "date" : "2026-04-22T00:13:56+00:00",
      "details" : "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
      "product_ids" : [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64" ],
      "restart_required" : {
        "category" : "machine"
      },
      "url" : "https://access.redhat.com/errata/RHSA-2026:9513"
    }, {
      "category" : "workaround",
      "details" : "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, it is recommended to disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" > /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
      "product_ids" : [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64" ]
    } ],
    "scores" : [ {
      "cvss_v3" : {
        "attackComplexity" : "HIGH",
        "attackVector" : "NETWORK",
        "availabilityImpact" : "HIGH",
        "baseScore" : 7.5,
        "baseSeverity" : "HIGH",
        "confidentialityImpact" : "HIGH",
        "integrityImpact" : "HIGH",
        "privilegesRequired" : "LOW",
        "scope" : "UNCHANGED",
        "userInteraction" : "NONE",
        "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
        "version" : "3.1"
      },
      "products" : [ "BaseOS-8.2.0.Z.AUS:bpftool-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:bpftool-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.src", "BaseOS-8.2.0.Z.AUS:kernel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-abi-whitelists-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-core-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debug-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-devel-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-doc-0:4.18.0-193.195.1.el8_2.noarch", "BaseOS-8.2.0.Z.AUS:kernel-modules-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-modules-extra-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:kernel-tools-libs-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-0:4.18.0-193.195.1.el8_2.x86_64", "BaseOS-8.2.0.Z.AUS:python3-perf-debuginfo-0:4.18.0-193.195.1.el8_2.x86_64" ]
    } ],
    "threats" : [ {
      "category" : "impact",
      "details" : "Moderate"
    } ],
    "title" : "kernel: kernel: Privilege escalation or denial of service via use-after-free in nf_tables_addchain()"
  } ]
}