{"id":"USN-7332-3","summary":"linux-lts-xenial vulnerabilities","details":"Several security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - PowerPC architecture;\n  - Block layer subsystem;\n  - GPIO subsystem;\n  - GPU drivers;\n  - Media drivers;\n  - Network drivers;\n  - SCSI subsystem;\n  - Direct Digital Synthesis drivers;\n  - TTY drivers;\n  - 9P distributed file system;\n  - JFS file system;\n  - NILFS2 file system;\n  - File systems infrastructure;\n  - BPF subsystem;\n  - Netfilter;\n  - Network sockets;\n  - Memory management;\n  - Amateur Radio drivers;\n  - B.A.T.M.A.N. meshing protocol;\n  - Bluetooth subsystem;\n  - Ethernet bridge;\n  - Networking core;\n  - IPv4 networking;\n  - IPv6 networking;\n  - Netlink;\n  - TIPC protocol;\n  - Wireless networking;\n  - ALSA framework;\n(CVE-2024-53156, CVE-2024-40943, CVE-2024-49902, CVE-2023-52488,\nCVE-2024-50233, CVE-2024-40911, CVE-2022-48994, CVE-2024-40981,\nCVE-2024-53104, CVE-2024-43900, CVE-2024-44938, CVE-2024-36952,\nCVE-2023-52799, CVE-2021-47103, CVE-2024-43863, CVE-2024-50171,\nCVE-2024-43892, CVE-2023-52522, CVE-2021-47606, CVE-2024-50148,\nCVE-2024-50117, CVE-2024-43893, CVE-2024-38567, CVE-2024-36886,\nCVE-2024-41064, CVE-2023-52818, CVE-2024-26685, CVE-2024-41063,\nCVE-2024-43854, CVE-2024-44931, CVE-2024-42068, CVE-2024-40910,\nCVE-2023-52880, CVE-2024-42070, CVE-2024-36964, CVE-2024-35896)\n","modified":"2026-02-10T04:47:18Z","published":"2025-03-13T09:40:20Z","related":["UBUNTU-CVE-2021-47103","UBUNTU-CVE-2021-47606","UBUNTU-CVE-2022-48994","UBUNTU-CVE-2023-52488","UBUNTU-CVE-2023-52522","UBUNTU-CVE-2023-52799","UBUNTU-CVE-2023-52818","UBUNTU-CVE-2023-52880","UBUNTU-CVE-2024-26685","UBUNTU-CVE-2024-35896","UBUNTU-CVE-2024-36886","UBUNTU-CVE-2024-36952","UBUNTU-CVE-2024-36964","UBUNTU-CVE-2024-38567","UBUNTU-CVE-2024-40910","UBUNTU-CVE-2024-40911","UBUNTU-CVE-2024-40943","UBUNTU-CVE-2024-40981","UBUNTU-CVE-2024-41063","UBUNTU-CVE-2024-41064","UBUNTU-CVE-2024-42068","UBUNTU-CVE-2024-42070","UBUNTU-CVE-2024-43854","UBUNTU-CVE-2024-43863","UBUNTU-CVE-2024-43892","UBUNTU-CVE-2024-43893","UBUNTU-CVE-2024-43900","UBUNTU-CVE-2024-44931","UBUNTU-CVE-2024-44938","UBUNTU-CVE-2024-49902","UBUNTU-CVE-2024-50117","UBUNTU-CVE-2024-50148","UBUNTU-CVE-2024-50171","UBUNTU-CVE-2024-50233","UBUNTU-CVE-2024-53104","UBUNTU-CVE-2024-53156"],"upstream":["CVE-2021-47103","CVE-2021-47606","CVE-2022-48994","CVE-2023-52488","CVE-2023-52522","CVE-2023-52799","CVE-2023-52818","CVE-2023-52880","CVE-2024-26685","CVE-2024-35896","CVE-2024-36886","CVE-2024-36952","CVE-2024-36964","CVE-2024-38567","CVE-2024-40910","CVE-2024-40911","CVE-2024-40943","CVE-2024-40981","CVE-2024-41063","CVE-2024-41064","CVE-2024-42068","CVE-2024-42070","CVE-2024-43854","CVE-2024-43863","CVE-2024-43892","CVE-2024-43893","CVE-2024-43900","CVE-2024-44931","CVE-2024-44938","CVE-2024-49902","CVE-2024-50117","CVE-2024-50148","CVE-2024-50171","CVE-2024-50233","CVE-2024-53104","CVE-2024-53156","UBUNTU-CVE-2021-47103","UBUNTU-CVE-2021-47606","UBUNTU-CVE-2022-48994","UBUNTU-CVE-2023-52488","UBUNTU-CVE-2023-52522","UBUNTU-CVE-2023-52799","UBUNTU-CVE-2023-52818","UBUNTU-CVE-2023-52880","UBUNTU-CVE-2024-26685","UBUNTU-CVE-2024-35896","UBUNTU-CVE-2024-36886","UBUNTU-CVE-2024-36952","UBUNTU-CVE-2024-36964","UBUNTU-CVE-2024-38567","UBUNTU-CVE-2024-40910","UBUNTU-CVE-2024-40911","UBUNTU-CVE-2024-40943","UBUNTU-CVE-2024-40981","UBUNTU-CVE-2024-41063","UBUNTU-CVE-2024-41064","UBUNTU-CVE-2024-42068","UBUNTU-CVE-2024-42070","UBUNTU-CVE-2024-43854","UBUNTU-CVE-2024-43863","UBUNTU-CVE-2024-43892","UBUNTU-CVE-2024-43893","UBUNTU-CVE-2024-43900","UBUNTU-CVE-2024-44931","UBUNTU-CVE-2024-44938","UBUNTU-CVE-2024-49902","UBUNTU-CVE-2024-50117","UBUNTU-CVE-2024-50148","UBUNTU-CVE-2024-50171","UBUNTU-CVE-2024-50233","UBUNTU-CVE-2024-53104","UBUNTU-CVE-2024-53156"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7332-3"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-47103"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-47606"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-48994"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52488"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52522"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52799"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52818"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52880"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26685"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-35896"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-36886"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-36952"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-36964"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-38567"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-40910"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-40911"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-40943"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-40981"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-41063"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-41064"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-42068"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-42070"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-43854"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-43863"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-43892"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-43893"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-43900"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-44931"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-44938"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-49902"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-50117"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-50148"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-50171"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-50233"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-53104"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-53156"}],"affected":[{"package":{"name":"linux-lts-xenial","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/linux-lts-xenial@4.4.0-266.300~14.04.1?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-266.300~14.04.1"}]}],"versions":["4.4.0-13.29~14.04.1","4.4.0-14.30~14.04.2","4.4.0-15.31~14.04.1","4.4.0-18.34~14.04.1","4.4.0-21.37~14.04.1","4.4.0-22.39~14.04.1","4.4.0-22.40~14.04.1","4.4.0-24.43~14.04.1","4.4.0-28.47~14.04.1","4.4.0-31.50~14.04.1","4.4.0-34.53~14.04.1","4.4.0-36.55~14.04.1","4.4.0-38.57~14.04.1","4.4.0-42.62~14.04.1","4.4.0-45.66~14.04.1","4.4.0-47.68~14.04.1","4.4.0-51.72~14.04.1","4.4.0-53.74~14.04.1","4.4.0-57.78~14.04.1","4.4.0-59.80~14.04.1","4.4.0-62.83~14.04.1","4.4.0-63.84~14.04.2","4.4.0-64.85~14.04.1","4.4.0-66.87~14.04.1","4.4.0-67.88~14.04.1","4.4.0-70.91~14.04.1","4.4.0-71.92~14.04.1","4.4.0-72.93~14.04.1","4.4.0-75.96~14.04.1","4.4.0-78.99~14.04.2","4.4.0-79.100~14.04.1","4.4.0-81.104~14.04.1","4.4.0-83.106~14.04.1","4.4.0-87.110~14.04.1","4.4.0-89.112~14.04.1","4.4.0-91.114~14.04.1","4.4.0-92.115~14.04.1","4.4.0-93.116~14.04.1","4.4.0-96.119~14.04.1","4.4.0-97.120~14.04.1","4.4.0-98.121~14.04.1","4.4.0-101.124~14.04.1","4.4.0-103.126~14.04.1","4.4.0-104.127~14.04.1","4.4.0-108.131~14.04.1","4.4.0-109.132~14.04.1","4.4.0-111.134~14.04.1","4.4.0-112.135~14.04.1","4.4.0-116.140~14.04.1","4.4.0-119.143~14.04.1","4.4.0-121.145~14.04.1","4.4.0-124.148~14.04.1","4.4.0-127.153~14.04.1","4.4.0-128.154~14.04.1","4.4.0-130.156~14.04.1","4.4.0-131.157~14.04.1","4.4.0-133.159~14.04.1","4.4.0-134.160~14.04.1","4.4.0-135.161~14.04.1","4.4.0-137.163~14.04.1","4.4.0-138.164~14.04.1","4.4.0-139.165~14.04.1","4.4.0-140.166~14.04.1","4.4.0-141.167~14.04.1","4.4.0-142.168~14.04.1","4.4.0-143.169~14.04.2","4.4.0-144.170~14.04.1","4.4.0-146.172~14.04.1","4.4.0-148.174~14.04.1","4.4.0-150.176~14.04.1","4.4.0-151.178~14.04.1","4.4.0-154.181~14.04.1","4.4.0-157.185~14.04.1","4.4.0-159.187~14.04.1","4.4.0-161.189~14.04.1","4.4.0-164.192~14.04.1","4.4.0-165.193~14.04.1","4.4.0-166.195~14.04.1","4.4.0-168.197~14.04.1","4.4.0-169.198~14.04.1","4.4.0-170.199~14.04.1","4.4.0-171.200~14.04.1","4.4.0-173.203~14.04.1","4.4.0-174.204~14.04.1","4.4.0-176.206~14.04.1","4.4.0-177.207~14.04.1","4.4.0-178.208~14.04.1","4.4.0-179.209~14.04.1","4.4.0-184.214~14.04.1","4.4.0-185.215~14.04.1","4.4.0-186.216~14.04.1","4.4.0-187.217~14.04.1","4.4.0-189.219~14.04.1","4.4.0-190.220~14.04.1","4.4.0-193.224~14.04.1","4.4.0-194.226~14.04.1","4.4.0-197.229~14.04.1","4.4.0-198.230~14.04.1","4.4.0-200.232~14.04.1","4.4.0-201.233~14.04.1","4.4.0-203.235~14.04.1","4.4.0-204.236~14.04.1","4.4.0-206.238~14.04.1","4.4.0-208.240~14.04.1","4.4.0-209.241~14.04.1","4.4.0-210.242~14.04.1","4.4.0-211.243~14.04.1","4.4.0-212.244~14.04.1","4.4.0-213.245~14.04.1","4.4.0-214.246~14.04.1","4.4.0-215.247~14.04.1","4.4.0-218.251~14.04.1","4.4.0-219.252~14.04.1","4.4.0-221.254~14.04.1","4.4.0-222.255~14.04.1","4.4.0-223.256~14.04.1","4.4.0-224.257~14.04.1","4.4.0-227.261~14.04.1","4.4.0-229.263~14.04.1","4.4.0-230.264~14.04.1","4.4.0-231.265~14.04.1","4.4.0-233.267~14.04.1","4.4.0-234.268~14.04.1","4.4.0-235.269~14.04.1","4.4.0-236.270~14.04.1","4.4.0-237.271~14.04.1","4.4.0-239.273~14.04.1","4.4.0-240.274~14.04.1","4.4.0-241.275~14.04.1","4.4.0-242.276~14.04.1","4.4.0-243.277~14.04.1","4.4.0-244.278~14.04.1","4.4.0-245.279~14.04.1","4.4.0-246.280~14.04.1","4.4.0-248.282~14.04.1","4.4.0-250.284~14.04.1","4.4.0-251.285~14.04.1","4.4.0-252.286~14.04.1","4.4.0-253.287~14.04.1","4.4.0-254.288~14.04.1","4.4.0-256.290~14.04.1","4.4.0-257.291~14.04.1","4.4.0-258.292~14.04.2","4.4.0-259.293~14.04.1","4.4.0-260.294~14.04.1","4.4.0-261.295~14.04.1","4.4.0-262.296~14.04.1","4.4.0-263.297~14.04.1","4.4.0-264.298~14.04.1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro","binaries":[{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"block-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"crypto-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"fat-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"fb-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"firewire-core-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"floppy-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"fs-core-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"fs-secondary-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"input-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"ipmi-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"irda-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"kernel-image-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"linux-buildinfo-4.4.0-266-generic"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"linux-buildinfo-4.4.0-266-lowlatency"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"linux-cloud-tools-4.4.0-266-generic"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"linux-cloud-tools-4.4.0-266-lowlatency"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"linux-headers-4.4.0-266"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"linux-headers-4.4.0-266-generic"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"linux-headers-4.4.0-266-lowlatency"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"linux-image-4.4.0-266-generic"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"linux-image-unsigned-4.4.0-266-generic"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"linux-image-unsigned-4.4.0-266-lowlatency"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"linux-lts-xenial-cloud-tools-4.4.0-266"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"linux-lts-xenial-tools-4.4.0-266"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"linux-lts-xenial-udebs-generic"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"linux-modules-4.4.0-266-generic"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"linux-modules-4.4.0-266-lowlatency"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"linux-modules-extra-4.4.0-266-generic"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"linux-tools-4.4.0-266-generic"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"linux-tools-4.4.0-266-lowlatency"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"md-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"message-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"mouse-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"multipath-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"nfs-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"nic-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"nic-pcmcia-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"nic-shared-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"nic-usb-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"parport-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"pata-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"pcmcia-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"pcmcia-storage-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"plip-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"ppp-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"sata-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"scsi-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"serial-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"speakup-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"storage-core-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"usb-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"virtio-modules-4.4.0-266-generic-di"},{"binary_version":"4.4.0-266.300~14.04.1","binary_name":"vlan-modules-4.4.0-266-generic-di"}]},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2021-47103","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2021-47606","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-48994","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-52488","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-52522","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-52799","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-52818","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2023-52880","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2024-26685","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-35896","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-36886","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-36952","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-36964","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-38567","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-40910","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-40911","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-40943","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-40981","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-41063","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-41064","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-42070","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-43854","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-43863","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-43892","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-43893","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-43900","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-44931","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-44938","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-49902","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-50117","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-50148","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-50171","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-50233","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-53104","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2024-53156","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:Pro:14.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7332-3.json"}}],"schema_version":"1.7.3"}