{"id":"USN-7183-1","summary":"linux, linux-lts-xenial vulnerabilities","details":"Andy Nguyen discovered that the Bluetooth L2CAP implementation in the Linux\nkernel contained a type-confusion error. A physically proximate remote\nattacker could use this to cause a denial of service (system crash) or\npossibly execute arbitrary code. (CVE-2020-12351)\n\nAndy Nguyen discovered that the Bluetooth A2MP implementation in the Linux\nkernel did not properly initialize memory in some situations. A physically\nproximate remote attacker could use this to expose sensitive information\n(kernel memory). (CVE-2020-12352)\n\nAndy Nguyen discovered that the Bluetooth HCI event packet parser in the\nLinux kernel did not properly handle event advertisements of certain sizes,\nleading to a heap-based buffer overflow. A physically proximate remote\nattacker could use this to cause a denial of service (system crash) or\npossibly execute arbitrary code. (CVE-2020-24490)\n\nZiming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux\nkernel contained an integer overflow vulnerability. A local attacker could\nuse this to cause a denial of service (system crash). (CVE-2022-36402)\n\nZheng Wang discovered a use-after-free in the Renesas Ethernet AVB driver\nin the Linux kernel during device removal. A privileged attacker could use\nthis to cause a denial of service (system crash). (CVE-2023-35827)\n\nSeveral security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - GPU drivers;\n  - I2C subsystem;\n  - Network drivers;\n  - Pin controllers subsystem;\n  - TTY drivers;\n  - USB Mass Storage drivers;\n  - Framebuffer layer;\n  - Ext4 file system;\n  - File systems infrastructure;\n  - Bluetooth subsystem;\n  - Kernel init infrastructure;\n  - DMA mapping infrastructure;\n  - Memory management;\n  - 9P file system network protocol;\n  - IPv4 networking;\n  - IPv6 networking;\n  - Logical Link layer;\n  - MAC80211 subsystem;\n  - Netfilter;\n  - NFC subsystem;\n  - Phonet protocol;\n  - Network traffic control;\n  - Wireless networking;\n(CVE-2024-44947, CVE-2023-52594, CVE-2024-35886, CVE-2024-38633,\nCVE-2023-52509, CVE-2024-26625, CVE-2024-36946, CVE-2024-45021,\nCVE-2024-36270, CVE-2021-47118, CVE-2024-43884, CVE-2024-36941,\nCVE-2024-38619, CVE-2021-47501, CVE-2024-49967, CVE-2024-42090,\nCVE-2024-40912, CVE-2024-36968, CVE-2024-53057, CVE-2023-52507,\nCVE-2024-42101, CVE-2021-47086, CVE-2024-42153, CVE-2024-40959,\nCVE-2024-26777, CVE-2024-44944, CVE-2024-43856, CVE-2024-39301)\n","modified":"2026-02-10T04:46:28Z","published":"2025-01-06T19:07:53Z","related":["UBUNTU-CVE-2020-12351","UBUNTU-CVE-2020-12352","UBUNTU-CVE-2020-24490","UBUNTU-CVE-2021-47086","UBUNTU-CVE-2021-47118","UBUNTU-CVE-2021-47501","UBUNTU-CVE-2022-36402","UBUNTU-CVE-2023-35827","UBUNTU-CVE-2023-52507","UBUNTU-CVE-2023-52509","UBUNTU-CVE-2023-52594","UBUNTU-CVE-2024-26625","UBUNTU-CVE-2024-26777","UBUNTU-CVE-2024-35886","UBUNTU-CVE-2024-36270","UBUNTU-CVE-2024-36941","UBUNTU-CVE-2024-36946","UBUNTU-CVE-2024-36968","UBUNTU-CVE-2024-38619","UBUNTU-CVE-2024-38633","UBUNTU-CVE-2024-39301","UBUNTU-CVE-2024-40912","UBUNTU-CVE-2024-40959","UBUNTU-CVE-2024-42090","UBUNTU-CVE-2024-42101","UBUNTU-CVE-2024-42153","UBUNTU-CVE-2024-43856","UBUNTU-CVE-2024-43884","UBUNTU-CVE-2024-44944","UBUNTU-CVE-2024-44947","UBUNTU-CVE-2024-45021","UBUNTU-CVE-2024-49967","UBUNTU-CVE-2024-53057"],"upstream":["CVE-2020-12351","CVE-2020-12352","CVE-2020-24490","CVE-2021-47086","CVE-2021-47118","CVE-2021-47501","CVE-2022-36402","CVE-2023-35827","CVE-2023-52507","CVE-2023-52509","CVE-2023-52594","CVE-2024-26625","CVE-2024-26777","CVE-2024-35886","CVE-2024-36270","CVE-2024-36941","CVE-2024-36946","CVE-2024-36968","CVE-2024-38619","CVE-2024-38633","CVE-2024-39301","CVE-2024-40912","CVE-2024-40959","CVE-2024-42090","CVE-2024-42101","CVE-2024-42153","CVE-2024-43856","CVE-2024-43884","CVE-2024-44944","CVE-2024-44947","CVE-2024-45021","CVE-2024-49967","CVE-2024-53057","UBUNTU-CVE-2020-12351","UBUNTU-CVE-2020-12352","UBUNTU-CVE-2020-24490","UBUNTU-CVE-2021-47086","UBUNTU-CVE-2021-47118","UBUNTU-CVE-2021-47501","UBUNTU-CVE-2022-36402","UBUNTU-CVE-2023-35827","UBUNTU-CVE-2023-52507","UBUNTU-CVE-2023-52509","UBUNTU-CVE-2023-52594","UBUNTU-CVE-2024-26625","UBUNTU-CVE-2024-26777","UBUNTU-CVE-2024-35886","UBUNTU-CVE-2024-36270","UBUNTU-CVE-2024-36941","UBUNTU-CVE-2024-36946","UBUNTU-CVE-2024-36968","UBUNTU-CVE-2024-38619","UBUNTU-CVE-2024-38633","UBUNTU-CVE-2024-39301","UBUNTU-CVE-2024-40912","UBUNTU-CVE-2024-40959","UBUNTU-CVE-2024-42090","UBUNTU-CVE-2024-42101","UBUNTU-CVE-2024-42153","UBUNTU-CVE-2024-43856","UBUNTU-CVE-2024-43884","UBUNTU-CVE-2024-44944","UBUNTU-CVE-2024-44947","UBUNTU-CVE-2024-45021","UBUNTU-CVE-2024-49967","UBUNTU-CVE-2024-53057"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7183-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-12351"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-12352"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-24490"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-47086"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-47118"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-47501"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-36402"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-35827"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52507"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52509"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52594"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26625"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26777"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-35886"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-36270"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-36941"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-36946"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-36968"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-38619"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-38633"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-39301"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-40912"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-40959"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-42090"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-42101"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-42153"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-43856"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-43884"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-44944"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-44947"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-45021"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-49967"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-53057"}],"affected":[{"package":{"name":"linux-lts-xenial","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/linux-lts-xenial@4.4.0-262.296~14.04.1?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-262.296~14.04.1"}]}],"versions":["4.4.0-13.29~14.04.1","4.4.0-14.30~14.04.2","4.4.0-15.31~14.04.1","4.4.0-18.34~14.04.1","4.4.0-21.37~14.04.1","4.4.0-22.39~14.04.1","4.4.0-22.40~14.04.1","4.4.0-24.43~14.04.1","4.4.0-28.47~14.04.1","4.4.0-31.50~14.04.1","4.4.0-34.53~14.04.1","4.4.0-36.55~14.04.1","4.4.0-38.57~14.04.1","4.4.0-42.62~14.04.1","4.4.0-45.66~14.04.1","4.4.0-47.68~14.04.1","4.4.0-51.72~14.04.1","4.4.0-53.74~14.04.1","4.4.0-57.78~14.04.1","4.4.0-59.80~14.04.1","4.4.0-62.83~14.04.1","4.4.0-63.84~14.04.2","4.4.0-64.85~14.04.1","4.4.0-66.87~14.04.1","4.4.0-67.88~14.04.1","4.4.0-70.91~14.04.1","4.4.0-71.92~14.04.1","4.4.0-72.93~14.04.1","4.4.0-75.96~14.04.1","4.4.0-78.99~14.04.2","4.4.0-79.100~14.04.1","4.4.0-81.104~14.04.1","4.4.0-83.106~14.04.1","4.4.0-87.110~14.04.1","4.4.0-89.112~14.04.1","4.4.0-91.114~14.04.1","4.4.0-92.115~14.04.1","4.4.0-93.116~14.04.1","4.4.0-96.119~14.04.1","4.4.0-97.120~14.04.1","4.4.0-98.121~14.04.1","4.4.0-101.124~14.04.1","4.4.0-103.126~14.04.1","4.4.0-104.127~14.04.1","4.4.0-108.131~14.04.1","4.4.0-109.132~14.04.1","4.4.0-111.134~14.04.1","4.4.0-112.135~14.04.1","4.4.0-116.140~14.04.1","4.4.0-119.143~14.04.1","4.4.0-121.145~14.04.1","4.4.0-124.148~14.04.1","4.4.0-127.153~14.04.1","4.4.0-128.154~14.04.1","4.4.0-130.156~14.04.1","4.4.0-131.157~14.04.1","4.4.0-133.159~14.04.1","4.4.0-134.160~14.04.1","4.4.0-135.161~14.04.1","4.4.0-137.163~14.04.1","4.4.0-138.164~14.04.1","4.4.0-139.165~14.04.1","4.4.0-140.166~14.04.1","4.4.0-141.167~14.04.1","4.4.0-142.168~14.04.1","4.4.0-143.169~14.04.2","4.4.0-144.170~14.04.1","4.4.0-146.172~14.04.1","4.4.0-148.174~14.04.1","4.4.0-150.176~14.04.1","4.4.0-151.178~14.04.1","4.4.0-154.181~14.04.1","4.4.0-157.185~14.04.1","4.4.0-159.187~14.04.1","4.4.0-161.189~14.04.1","4.4.0-164.192~14.04.1","4.4.0-165.193~14.04.1","4.4.0-166.195~14.04.1","4.4.0-168.197~14.04.1","4.4.0-169.198~14.04.1","4.4.0-170.199~14.04.1","4.4.0-171.200~14.04.1","4.4.0-173.203~14.04.1","4.4.0-174.204~14.04.1","4.4.0-176.206~14.04.1","4.4.0-177.207~14.04.1","4.4.0-178.208~14.04.1","4.4.0-179.209~14.04.1","4.4.0-184.214~14.04.1","4.4.0-185.215~14.04.1","4.4.0-186.216~14.04.1","4.4.0-187.217~14.04.1","4.4.0-189.219~14.04.1","4.4.0-190.220~14.04.1","4.4.0-193.224~14.04.1","4.4.0-194.226~14.04.1","4.4.0-197.229~14.04.1","4.4.0-198.230~14.04.1","4.4.0-200.232~14.04.1","4.4.0-201.233~14.04.1","4.4.0-203.235~14.04.1","4.4.0-204.236~14.04.1","4.4.0-206.238~14.04.1","4.4.0-208.240~14.04.1","4.4.0-209.241~14.04.1","4.4.0-210.242~14.04.1","4.4.0-211.243~14.04.1","4.4.0-212.244~14.04.1","4.4.0-213.245~14.04.1","4.4.0-214.246~14.04.1","4.4.0-215.247~14.04.1","4.4.0-218.251~14.04.1","4.4.0-219.252~14.04.1","4.4.0-221.254~14.04.1","4.4.0-222.255~14.04.1","4.4.0-223.256~14.04.1","4.4.0-224.257~14.04.1","4.4.0-227.261~14.04.1","4.4.0-229.263~14.04.1","4.4.0-230.264~14.04.1","4.4.0-231.265~14.04.1","4.4.0-233.267~14.04.1","4.4.0-234.268~14.04.1","4.4.0-235.269~14.04.1","4.4.0-236.270~14.04.1","4.4.0-237.271~14.04.1","4.4.0-239.273~14.04.1","4.4.0-240.274~14.04.1","4.4.0-241.275~14.04.1","4.4.0-242.276~14.04.1","4.4.0-243.277~14.04.1","4.4.0-244.278~14.04.1","4.4.0-245.279~14.04.1","4.4.0-246.280~14.04.1","4.4.0-248.282~14.04.1","4.4.0-250.284~14.04.1","4.4.0-251.285~14.04.1","4.4.0-252.286~14.04.1","4.4.0-253.287~14.04.1","4.4.0-254.288~14.04.1","4.4.0-256.290~14.04.1","4.4.0-257.291~14.04.1","4.4.0-258.292~14.04.2","4.4.0-259.293~14.04.1","4.4.0-260.294~14.04.1","4.4.0-261.295~14.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"block-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"crypto-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"fat-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"fb-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"firewire-core-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"floppy-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"fs-core-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"fs-secondary-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"input-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"ipmi-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"irda-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"kernel-image-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"linux-buildinfo-4.4.0-262-generic","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"linux-buildinfo-4.4.0-262-lowlatency","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"linux-cloud-tools-4.4.0-262-generic","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"linux-cloud-tools-4.4.0-262-lowlatency","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"linux-headers-4.4.0-262","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"linux-headers-4.4.0-262-generic","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"linux-headers-4.4.0-262-lowlatency","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"linux-image-4.4.0-262-generic","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"linux-image-unsigned-4.4.0-262-generic","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"linux-image-unsigned-4.4.0-262-lowlatency","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"linux-lts-xenial-cloud-tools-4.4.0-262","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"linux-lts-xenial-tools-4.4.0-262","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"linux-lts-xenial-udebs-generic","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"linux-modules-4.4.0-262-generic","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"linux-modules-4.4.0-262-lowlatency","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"linux-modules-extra-4.4.0-262-generic","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"linux-tools-4.4.0-262-generic","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"linux-tools-4.4.0-262-lowlatency","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"md-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"message-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"mouse-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"multipath-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"nfs-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"nic-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"nic-pcmcia-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"nic-shared-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"nic-usb-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"parport-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"pata-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"pcmcia-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"pcmcia-storage-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"plip-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"ppp-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"sata-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"scsi-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"serial-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"speakup-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"storage-core-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"usb-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"virtio-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"},{"binary_name":"vlan-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296~14.04.1"}],"availability":"Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2020-12351"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-12352"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-24490"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-47086"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-47118"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-47501"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2022-36402"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2023-35827"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52507"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52509"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52594"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26625"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26777"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-35886"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-36270"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-36941"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-36946"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-36968"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-38619"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-38633"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-39301"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-40912"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-40959"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-42090"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-42101"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-42153"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-43856"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-43884"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-44944"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-44947"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-45021"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-49967"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-53057"}],"ecosystem":"Ubuntu:Pro:14.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7183-1.json"}},{"package":{"name":"linux","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/linux@4.4.0-262.296?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-262.296"}]}],"versions":["4.2.0-16.19","4.2.0-17.21","4.2.0-19.23","4.3.0-1.10","4.3.0-2.11","4.3.0-5.16","4.3.0-6.17","4.3.0-7.18","4.4.0-2.16","4.4.0-4.19","4.4.0-6.21","4.4.0-7.22","4.4.0-8.23","4.4.0-9.24","4.4.0-10.25","4.4.0-11.26","4.4.0-12.28","4.4.0-13.29","4.4.0-14.30","4.4.0-15.31","4.4.0-16.32","4.4.0-17.33","4.4.0-18.34","4.4.0-21.37","4.4.0-22.39","4.4.0-22.40","4.4.0-24.43","4.4.0-28.47","4.4.0-31.50","4.4.0-34.53","4.4.0-36.55","4.4.0-38.57","4.4.0-42.62","4.4.0-43.63","4.4.0-45.66","4.4.0-47.68","4.4.0-51.72","4.4.0-53.74","4.4.0-57.78","4.4.0-59.80","4.4.0-62.83","4.4.0-63.84","4.4.0-64.85","4.4.0-65.86","4.4.0-66.87","4.4.0-67.88","4.4.0-70.91","4.4.0-71.92","4.4.0-72.93","4.4.0-75.96","4.4.0-77.98","4.4.0-78.99","4.4.0-79.100","4.4.0-81.104","4.4.0-83.106","4.4.0-87.110","4.4.0-89.112","4.4.0-91.114","4.4.0-92.115","4.4.0-93.116","4.4.0-96.119","4.4.0-97.120","4.4.0-98.121","4.4.0-101.124","4.4.0-103.126","4.4.0-104.127","4.4.0-108.131","4.4.0-109.132","4.4.0-112.135","4.4.0-116.140","4.4.0-119.143","4.4.0-121.145","4.4.0-122.146","4.4.0-124.148","4.4.0-127.153","4.4.0-128.154","4.4.0-130.156","4.4.0-131.157","4.4.0-133.159","4.4.0-134.160","4.4.0-135.161","4.4.0-137.163","4.4.0-138.164","4.4.0-139.165","4.4.0-140.166","4.4.0-141.167","4.4.0-142.168","4.4.0-143.169","4.4.0-145.171","4.4.0-146.172","4.4.0-148.174","4.4.0-150.176","4.4.0-151.178","4.4.0-154.181","4.4.0-157.185","4.4.0-159.187","4.4.0-161.189","4.4.0-164.192","4.4.0-165.193","4.4.0-166.195","4.4.0-168.197","4.4.0-169.198","4.4.0-170.199","4.4.0-171.200","4.4.0-173.203","4.4.0-174.204","4.4.0-176.206","4.4.0-177.207","4.4.0-178.208","4.4.0-179.209","4.4.0-184.214","4.4.0-185.215","4.4.0-186.216","4.4.0-187.217","4.4.0-189.219","4.4.0-190.220","4.4.0-193.224","4.4.0-194.226","4.4.0-197.229","4.4.0-198.230","4.4.0-200.232","4.4.0-201.233","4.4.0-203.235","4.4.0-204.236","4.4.0-206.238","4.4.0-208.240","4.4.0-209.241","4.4.0-210.242","4.4.0-211.243","4.4.0-212.244","4.4.0-213.245","4.4.0-214.246","4.4.0-216.249","4.4.0-217.250","4.4.0-218.251","4.4.0-219.252","4.4.0-221.254","4.4.0-222.255","4.4.0-223.256","4.4.0-224.257","4.4.0-227.261","4.4.0-229.263","4.4.0-230.264","4.4.0-231.265","4.4.0-233.267","4.4.0-234.268","4.4.0-235.269","4.4.0-236.270","4.4.0-237.271","4.4.0-239.273","4.4.0-240.274","4.4.0-241.275","4.4.0-242.276","4.4.0-243.277","4.4.0-244.278","4.4.0-245.279","4.4.0-246.280","4.4.0-248.282","4.4.0-250.284","4.4.0-251.285","4.4.0-252.286","4.4.0-253.287","4.4.0-254.288","4.4.0-256.290","4.4.0-257.291","4.4.0-258.292","4.4.0-259.293","4.4.0-260.294","4.4.0-261.295"],"ecosystem_specific":{"binaries":[{"binary_name":"block-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"crypto-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"dasd-extra-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"dasd-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"fat-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"fb-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"firewire-core-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"floppy-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"fs-core-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"fs-secondary-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"input-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"ipmi-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"irda-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"kernel-image-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"linux-buildinfo-4.4.0-262-generic","binary_version":"4.4.0-262.296"},{"binary_name":"linux-buildinfo-4.4.0-262-lowlatency","binary_version":"4.4.0-262.296"},{"binary_name":"linux-cloud-tools-4.4.0-262","binary_version":"4.4.0-262.296"},{"binary_name":"linux-cloud-tools-4.4.0-262-generic","binary_version":"4.4.0-262.296"},{"binary_name":"linux-cloud-tools-4.4.0-262-lowlatency","binary_version":"4.4.0-262.296"},{"binary_name":"linux-cloud-tools-common","binary_version":"4.4.0-262.296"},{"binary_name":"linux-headers-4.4.0-262","binary_version":"4.4.0-262.296"},{"binary_name":"linux-headers-4.4.0-262-generic","binary_version":"4.4.0-262.296"},{"binary_name":"linux-headers-4.4.0-262-lowlatency","binary_version":"4.4.0-262.296"},{"binary_name":"linux-image-4.4.0-262-generic","binary_version":"4.4.0-262.296"},{"binary_name":"linux-image-unsigned-4.4.0-262-generic","binary_version":"4.4.0-262.296"},{"binary_name":"linux-image-unsigned-4.4.0-262-lowlatency","binary_version":"4.4.0-262.296"},{"binary_name":"linux-libc-dev","binary_version":"4.4.0-262.296"},{"binary_name":"linux-modules-4.4.0-262-generic","binary_version":"4.4.0-262.296"},{"binary_name":"linux-modules-4.4.0-262-lowlatency","binary_version":"4.4.0-262.296"},{"binary_name":"linux-modules-extra-4.4.0-262-generic","binary_version":"4.4.0-262.296"},{"binary_name":"linux-source-4.4.0","binary_version":"4.4.0-262.296"},{"binary_name":"linux-tools-4.4.0-262","binary_version":"4.4.0-262.296"},{"binary_name":"linux-tools-4.4.0-262-generic","binary_version":"4.4.0-262.296"},{"binary_name":"linux-tools-4.4.0-262-lowlatency","binary_version":"4.4.0-262.296"},{"binary_name":"linux-tools-common","binary_version":"4.4.0-262.296"},{"binary_name":"linux-tools-host","binary_version":"4.4.0-262.296"},{"binary_name":"linux-udebs-generic","binary_version":"4.4.0-262.296"},{"binary_name":"md-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"message-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"mouse-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"multipath-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"nfs-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"nic-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"nic-pcmcia-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"nic-shared-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"nic-usb-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"parport-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"pata-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"pcmcia-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"pcmcia-storage-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"plip-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"ppp-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"sata-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"scsi-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"serial-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"speakup-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"storage-core-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"usb-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"virtio-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"},{"binary_name":"vlan-modules-4.4.0-262-generic-di","binary_version":"4.4.0-262.296"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2020-12351"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-12352"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-24490"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-47086"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-47118"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2021-47501"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2022-36402"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2023-35827"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52507"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52509"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-52594"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26625"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-26777"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-35886"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-36270"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-36941"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-36946"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-36968"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-38619"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-38633"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-39301"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-40912"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-40959"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-42090"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-42101"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-42153"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-43856"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-43884"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-44944"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-44947"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-45021"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-49967"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-53057"}],"ecosystem":"Ubuntu:Pro:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7183-1.json"}}],"schema_version":"1.7.3"}