{"id":"USN-7288-1","summary":"linux, linux-lowlatency vulnerabilities","details":"Attila Szász discovered that the HFS+ file system implementation in the\nLinux Kernel contained a heap overflow vulnerability. An attacker could use\na specially crafted file system image that, when mounted, could cause a\ndenial of service (system crash) or possibly execute arbitrary code.\n(CVE-2025-0927)\n\nSeveral security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - ARM64 architecture;\n  - x86 architecture;\n  - Block layer subsystem;\n  - ACPI drivers;\n  - GPU drivers;\n  - HID subsystem;\n  - I2C subsystem;\n  - IIO ADC drivers;\n  - IIO subsystem;\n  - InfiniBand drivers;\n  - IOMMU subsystem;\n  - IRQ chip drivers;\n  - Multiple devices driver;\n  - Media drivers;\n  - Network drivers;\n  - STMicroelectronics network drivers;\n  - Parport drivers;\n  - Pin controllers subsystem;\n  - Direct Digital Synthesis drivers;\n  - TCM subsystem;\n  - TTY drivers;\n  - USB Dual Role (OTG-ready) Controller drivers;\n  - USB Serial drivers;\n  - USB Type-C support driver;\n  - USB Type-C Connector System Software Interface driver;\n  - BTRFS file system;\n  - File systems infrastructure;\n  - Network file system (NFS) client;\n  - NILFS2 file system;\n  - NTFS3 file system;\n  - SMB network file system;\n  - User-space API (UAPI);\n  - io_uring subsystem;\n  - BPF subsystem;\n  - Timer substystem drivers;\n  - Tracing infrastructure;\n  - Closures library;\n  - Memory management;\n  - Amateur Radio drivers;\n  - Bluetooth subsystem;\n  - Networking core;\n  - IPv4 networking;\n  - MAC80211 subsystem;\n  - Multipath TCP;\n  - Netfilter;\n  - Network traffic control;\n  - SCTP protocol;\n  - XFRM subsystem;\n  - Key management;\n  - FireWire sound drivers;\n  - HD-audio driver;\n  - QCOM ASoC drivers;\n  - STMicroelectronics SoC drivers;\n  - KVM core;\n(CVE-2024-50202, CVE-2024-50208, CVE-2024-50265, CVE-2024-41080,\nCVE-2024-50101, CVE-2024-39497, CVE-2024-50153, CVE-2024-50162,\nCVE-2024-50150, CVE-2024-50115, CVE-2024-53066, CVE-2024-50279,\nCVE-2024-50116, CVE-2024-50218, CVE-2024-53104, CVE-2024-50086,\nCVE-2024-50154, CVE-2024-50244, CVE-2024-50074, CVE-2024-50278,\nCVE-2024-50262, CVE-2024-50168, CVE-2024-50134, CVE-2024-53063,\nCVE-2024-50236, CVE-2024-50082, CVE-2024-50234, CVE-2024-50247,\nCVE-2024-50282, CVE-2024-50267, CVE-2024-40965, CVE-2024-50229,\nCVE-2024-50110, CVE-2024-35887, CVE-2024-50302, CVE-2024-50036,\nCVE-2024-50209, CVE-2024-50287, CVE-2024-50245, CVE-2024-50072,\nCVE-2024-50301, CVE-2024-50201, CVE-2024-53097, CVE-2024-40953,\nCVE-2024-50085, CVE-2024-50299, CVE-2024-50292, CVE-2024-50269,\nCVE-2024-50182, CVE-2024-50233, CVE-2024-53088, CVE-2024-50259,\nCVE-2024-50232, CVE-2024-53055, CVE-2024-50195, CVE-2024-50273,\nCVE-2024-42291, CVE-2024-50192, CVE-2024-50251, CVE-2024-50193,\nCVE-2024-50142, CVE-2024-53101, CVE-2024-50205, CVE-2024-26718,\nCVE-2024-50167, CVE-2024-50010, CVE-2024-50230, CVE-2024-41066,\nCVE-2024-50194, CVE-2024-50148, CVE-2024-50151, CVE-2024-50127,\nCVE-2024-50160, CVE-2023-52913, CVE-2024-53052, CVE-2024-50156,\nCVE-2024-50141, CVE-2024-50103, CVE-2024-50296, CVE-2024-50257,\nCVE-2024-50199, CVE-2024-50128, CVE-2024-50058, CVE-2024-50099,\nCVE-2024-50290, CVE-2024-53042, CVE-2024-50295, CVE-2024-50268,\nCVE-2024-50163, CVE-2024-53058, CVE-2024-50185, CVE-2024-50117,\nCVE-2024-50237, CVE-2024-50083, CVE-2024-50131, CVE-2024-50196,\nCVE-2024-42252, CVE-2024-50143, CVE-2024-50171, CVE-2024-50249,\nCVE-2024-53059, CVE-2024-50198, CVE-2024-53061)\n","modified":"2026-04-24T10:02:44.973475693Z","published":"2025-02-24T17:45:13Z","related":["UBUNTU-CVE-2023-52913","UBUNTU-CVE-2024-26718","UBUNTU-CVE-2024-35887","UBUNTU-CVE-2024-39497","UBUNTU-CVE-2024-40953","UBUNTU-CVE-2024-40965","UBUNTU-CVE-2024-41066","UBUNTU-CVE-2024-41080","UBUNTU-CVE-2024-42252","UBUNTU-CVE-2024-42291","UBUNTU-CVE-2024-50010","UBUNTU-CVE-2024-50036","UBUNTU-CVE-2024-50058","UBUNTU-CVE-2024-50072","UBUNTU-CVE-2024-50074","UBUNTU-CVE-2024-50082","UBUNTU-CVE-2024-50083","UBUNTU-CVE-2024-50085","UBUNTU-CVE-2024-50086","UBUNTU-CVE-2024-50099","UBUNTU-CVE-2024-50101","UBUNTU-CVE-2024-50103","UBUNTU-CVE-2024-50110","UBUNTU-CVE-2024-50115","UBUNTU-CVE-2024-50116","UBUNTU-CVE-2024-50117","UBUNTU-CVE-2024-50127","UBUNTU-CVE-2024-50128","UBUNTU-CVE-2024-50131","UBUNTU-CVE-2024-50134","UBUNTU-CVE-2024-50141","UBUNTU-CVE-2024-50142","UBUNTU-CVE-2024-50143","UBUNTU-CVE-2024-50148","UBUNTU-CVE-2024-50150","UBUNTU-CVE-2024-50151","UBUNTU-CVE-2024-50153","UBUNTU-CVE-2024-50154","UBUNTU-CVE-2024-50156","UBUNTU-CVE-2024-50160","UBUNTU-CVE-2024-50162","UBUNTU-CVE-2024-50163","UBUNTU-CVE-2024-50167","UBUNTU-CVE-2024-50168","UBUNTU-CVE-2024-50171","UBUNTU-CVE-2024-50182","UBUNTU-CVE-2024-50185","UBUNTU-CVE-2024-50192","UBUNTU-CVE-2024-50193","UBUNTU-CVE-2024-50194","UBUNTU-CVE-2024-50195","UBUNTU-CVE-2024-50196","UBUNTU-CVE-2024-50198","UBUNTU-CVE-2024-50199","UBUNTU-CVE-2024-50201","UBUNTU-CVE-2024-50202","UBUNTU-CVE-2024-50205","UBUNTU-CVE-2024-50208","UBUNTU-CVE-2024-50209","UBUNTU-CVE-2024-50218","UBUNTU-CVE-2024-50229","UBUNTU-CVE-2024-50230","UBUNTU-CVE-2024-50232","UBUNTU-CVE-2024-50233","UBUNTU-CVE-2024-50234","UBUNTU-CVE-2024-50236","UBUNTU-CVE-2024-50237","UBUNTU-CVE-2024-50244","UBUNTU-CVE-2024-50245","UBUNTU-CVE-2024-50247","UBUNTU-CVE-2024-50249","UBUNTU-CVE-2024-50251","UBUNTU-CVE-2024-50257","UBUNTU-CVE-2024-50259","UBUNTU-CVE-2024-50262","UBUNTU-CVE-2024-50265","UBUNTU-CVE-2024-50267","UBUNTU-CVE-2024-50268","UBUNTU-CVE-2024-50269","UBUNTU-CVE-2024-50273","UBUNTU-CVE-2024-50278","UBUNTU-CVE-2024-50279","UBUNTU-CVE-2024-50282","UBUNTU-CVE-2024-50287","UBUNTU-CVE-2024-50290","UBUNTU-CVE-2024-50292","UBUNTU-CVE-2024-50295","UBUNTU-CVE-2024-50296","UBUNTU-CVE-2024-50299","UBUNTU-CVE-2024-50301","UBUNTU-CVE-2024-50302","UBUNTU-CVE-2024-53042","UBUNTU-CVE-2024-53052","UBUNTU-CVE-2024-53055","UBUNTU-CVE-2024-53058","UBUNTU-CVE-2024-53059","UBUNTU-CVE-2024-53061","UBUNTU-CVE-2024-53063","UBUNTU-CVE-2024-53066","UBUNTU-CVE-2024-53088","UBUNTU-CVE-2024-53097","UBUNTU-CVE-2024-53101","UBUNTU-CVE-2024-53104","UBUNTU-CVE-2025-0927"],"upstream":["CVE-2024-50072","CVE-2024-50074","CVE-2024-50085","CVE-2024-50101","CVE-2024-50193","CVE-2024-50249","CVE-2024-53042","CVE-2024-53097","UBUNTU-CVE-2024-50072","UBUNTU-CVE-2024-50074","UBUNTU-CVE-2024-50085","UBUNTU-CVE-2024-50101","UBUNTU-CVE-2024-50193","UBUNTU-CVE-2024-50249","UBUNTU-CVE-2024-53042","UBUNTU-CVE-2024-53097"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7288-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-50072"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-50074"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-50085"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-50101"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-50193"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-50249"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-53042"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-53097"}],"affected":[{"package":{"name":"linux","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux@5.15.0-133.144?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-133.144"}]}],"versions":["5.13.0-19.19","5.15.0-17.17","5.15.0-18.18","5.15.0-22.22","5.15.0-23.23","5.15.0-25.25","5.15.0-27.28","5.15.0-30.31","5.15.0-33.34","5.15.0-35.36","5.15.0-37.39","5.15.0-39.42","5.15.0-40.43","5.15.0-41.44","5.15.0-43.46","5.15.0-46.49","5.15.0-47.51","5.15.0-48.54","5.15.0-50.56","5.15.0-52.58","5.15.0-53.59","5.15.0-56.62","5.15.0-57.63","5.15.0-58.64","5.15.0-60.66","5.15.0-67.74","5.15.0-69.76","5.15.0-70.77","5.15.0-71.78","5.15.0-72.79","5.15.0-73.80","5.15.0-75.82","5.15.0-76.83","5.15.0-78.85","5.15.0-79.86","5.15.0-82.91","5.15.0-83.92","5.15.0-84.93","5.15.0-86.96","5.15.0-87.97","5.15.0-88.98","5.15.0-89.99","5.15.0-91.101","5.15.0-92.102","5.15.0-94.104","5.15.0-97.107","5.15.0-100.110","5.15.0-101.111","5.15.0-102.112","5.15.0-105.115","5.15.0-106.116","5.15.0-107.117","5.15.0-112.122","5.15.0-113.123","5.15.0-116.126","5.15.0-117.127","5.15.0-118.128","5.15.0-119.129","5.15.0-121.131","5.15.0-122.132","5.15.0-124.134","5.15.0-125.135","5.15.0-126.136","5.15.0-127.137","5.15.0-128.138","5.15.0-130.140","5.15.0-131.141"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-buildinfo-5.15.0-133-generic","binary_version":"5.15.0-133.144"},{"binary_version":"5.15.0-133.144","binary_name":"linux-buildinfo-5.15.0-133-generic-64k"},{"binary_version":"5.15.0-133.144","binary_name":"linux-buildinfo-5.15.0-133-generic-lpae"},{"binary_version":"5.15.0-133.144","binary_name":"linux-cloud-tools-5.15.0-133"},{"binary_name":"linux-cloud-tools-5.15.0-133-generic","binary_version":"5.15.0-133.144"},{"binary_version":"5.15.0-133.144","binary_name":"linux-cloud-tools-common"},{"binary_version":"5.15.0-133.144","binary_name":"linux-headers-5.15.0-133"},{"binary_version":"5.15.0-133.144","binary_name":"linux-headers-5.15.0-133-generic"},{"binary_version":"5.15.0-133.144","binary_name":"linux-headers-5.15.0-133-generic-64k"},{"binary_version":"5.15.0-133.144","binary_name":"linux-headers-5.15.0-133-generic-lpae"},{"binary_version":"5.15.0-133.144","binary_name":"linux-image-5.15.0-133-generic"},{"binary_version":"5.15.0-133.144","binary_name":"linux-image-5.15.0-133-generic-lpae"},{"binary_version":"5.15.0-133.144","binary_name":"linux-image-unsigned-5.15.0-133-generic"},{"binary_name":"linux-image-unsigned-5.15.0-133-generic-64k","binary_version":"5.15.0-133.144"},{"binary_version":"5.15.0-133.144","binary_name":"linux-modules-5.15.0-133-generic"},{"binary_version":"5.15.0-133.144","binary_name":"linux-modules-5.15.0-133-generic-64k"},{"binary_version":"5.15.0-133.144","binary_name":"linux-modules-5.15.0-133-generic-lpae"},{"binary_version":"5.15.0-133.144","binary_name":"linux-modules-extra-5.15.0-133-generic"},{"binary_version":"5.15.0-133.144","binary_name":"linux-modules-iwlwifi-5.15.0-133-generic"},{"binary_version":"5.15.0-133.144","binary_name":"linux-source-5.15.0"},{"binary_version":"5.15.0-133.144","binary_name":"linux-tools-5.15.0-133"},{"binary_version":"5.15.0-133.144","binary_name":"linux-tools-5.15.0-133-generic"},{"binary_version":"5.15.0-133.144","binary_name":"linux-tools-5.15.0-133-generic-64k"},{"binary_version":"5.15.0-133.144","binary_name":"linux-tools-5.15.0-133-generic-lpae"},{"binary_version":"5.15.0-133.144","binary_name":"linux-tools-common"},{"binary_version":"5.15.0-133.144","binary_name":"linux-tools-host"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7288-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-50072"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-50074"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-50085"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-50101"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-50193"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-50249"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-53042"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-53097"}],"ecosystem":"Ubuntu:22.04:LTS"}}},{"package":{"name":"linux-lowlatency","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/linux-lowlatency@5.15.0-133.143?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.0-133.143"}]}],"versions":["5.15.0-22.22","5.15.0-23.23","5.15.0-24.24","5.15.0-27.28","5.15.0-30.31","5.15.0-33.34","5.15.0-35.36","5.15.0-37.39","5.15.0-39.42","5.15.0-40.43","5.15.0-41.44","5.15.0-43.46","5.15.0-46.49","5.15.0-47.53","5.15.0-48.54","5.15.0-50.56","5.15.0-52.58","5.15.0-53.59","5.15.0-56.62","5.15.0-57.63","5.15.0-58.64","5.15.0-60.66","5.15.0-67.74","5.15.0-69.76","5.15.0-70.77","5.15.0-71.78","5.15.0-72.79","5.15.0-73.80","5.15.0-75.82","5.15.0-76.83","5.15.0-78.85","5.15.0-79.88","5.15.0-82.91","5.15.0-83.92","5.15.0-84.93","5.15.0-86.95","5.15.0-87.96","5.15.0-88.98","5.15.0-89.99","5.15.0-91.101","5.15.0-92.102","5.15.0-94.104","5.15.0-97.107","5.15.0-100.110","5.15.0-101.111","5.15.0-102.112","5.15.0-105.115","5.15.0-106.116","5.15.0-107.117","5.15.0-110.120","5.15.0-113.123","5.15.0-116.126","5.15.0-117.127","5.15.0-118.128","5.15.0-119.129","5.15.0-121.131","5.15.0-122.132","5.15.0-124.134","5.15.0-125.135","5.15.0-126.136","5.15.0-127.137","5.15.0-128.138","5.15.0-129.139","5.15.0-131.141"],"ecosystem_specific":{"binaries":[{"binary_version":"5.15.0-133.143","binary_name":"linux-buildinfo-5.15.0-133-lowlatency"},{"binary_version":"5.15.0-133.143","binary_name":"linux-buildinfo-5.15.0-133-lowlatency-64k"},{"binary_version":"5.15.0-133.143","binary_name":"linux-cloud-tools-5.15.0-133-lowlatency"},{"binary_version":"5.15.0-133.143","binary_name":"linux-headers-5.15.0-133-lowlatency"},{"binary_version":"5.15.0-133.143","binary_name":"linux-headers-5.15.0-133-lowlatency-64k"},{"binary_name":"linux-image-unsigned-5.15.0-133-lowlatency","binary_version":"5.15.0-133.143"},{"binary_version":"5.15.0-133.143","binary_name":"linux-image-unsigned-5.15.0-133-lowlatency-64k"},{"binary_version":"5.15.0-133.143","binary_name":"linux-lowlatency-cloud-tools-5.15.0-133"},{"binary_version":"5.15.0-133.143","binary_name":"linux-lowlatency-headers-5.15.0-133"},{"binary_version":"5.15.0-133.143","binary_name":"linux-lowlatency-tools-5.15.0-133"},{"binary_name":"linux-modules-5.15.0-133-lowlatency","binary_version":"5.15.0-133.143"},{"binary_version":"5.15.0-133.143","binary_name":"linux-modules-5.15.0-133-lowlatency-64k"},{"binary_name":"linux-modules-iwlwifi-5.15.0-133-lowlatency","binary_version":"5.15.0-133.143"},{"binary_version":"5.15.0-133.143","binary_name":"linux-tools-5.15.0-133-lowlatency"},{"binary_version":"5.15.0-133.143","binary_name":"linux-tools-5.15.0-133-lowlatency-64k"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7288-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-50072"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-50074"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-50085"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-50101"},{"id":"CVE-2024-50193","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-50249"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-53042"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-53097"}],"ecosystem":"Ubuntu:22.04:LTS"}}}],"schema_version":"1.7.5"}