{"id":"USN-7554-2","summary":"linux-aws, linux-lts-xenial vulnerabilities","details":"Several security issues were discovered in the Linux kernel.\nAn attacker could possibly use these to compromise the system.\nThis update corrects flaws in the following subsystems:\n  - Block layer subsystem;\n  - Clock framework and drivers;\n  - GPU drivers;\n  - Parport drivers;\n  - Ext4 file system;\n  - JFFS2 file system;\n  - JFS file system;\n  - File systems infrastructure;\n  - Sun RPC protocol;\n  - USB sound devices;\n(CVE-2024-42301, CVE-2024-53168, CVE-2024-57850, CVE-2024-47701,\nCVE-2021-47211, CVE-2023-52458, CVE-2024-56551, CVE-2024-26966,\nCVE-2024-53155, CVE-2024-56596, CVE-2021-47353)\n","modified":"2026-02-10T04:48:59Z","published":"2025-06-04T09:54:42Z","related":["UBUNTU-CVE-2021-47211","UBUNTU-CVE-2021-47353","UBUNTU-CVE-2023-52458","UBUNTU-CVE-2024-26966","UBUNTU-CVE-2024-42301","UBUNTU-CVE-2024-47701","UBUNTU-CVE-2024-53155","UBUNTU-CVE-2024-53168","UBUNTU-CVE-2024-56551","UBUNTU-CVE-2024-56596","UBUNTU-CVE-2024-57850"],"upstream":["CVE-2021-47211","CVE-2021-47353","CVE-2023-52458","CVE-2024-26966","CVE-2024-42301","CVE-2024-47701","CVE-2024-53155","CVE-2024-53168","CVE-2024-56551","CVE-2024-56596","CVE-2024-57850","UBUNTU-CVE-2021-47211","UBUNTU-CVE-2021-47353","UBUNTU-CVE-2023-52458","UBUNTU-CVE-2024-26966","UBUNTU-CVE-2024-42301","UBUNTU-CVE-2024-47701","UBUNTU-CVE-2024-53155","UBUNTU-CVE-2024-53168","UBUNTU-CVE-2024-56551","UBUNTU-CVE-2024-56596","UBUNTU-CVE-2024-57850"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7554-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-47211"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-47353"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-52458"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-26966"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-42301"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-47701"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-53155"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-53168"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56551"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-56596"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-57850"}],"affected":[{"package":{"name":"linux-aws","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/linux-aws@4.4.0-1144.150?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-1144.150"}]}],"versions":["4.4.0-1002.2","4.4.0-1003.3","4.4.0-1005.5","4.4.0-1006.6","4.4.0-1009.9","4.4.0-1010.10","4.4.0-1011.11","4.4.0-1012.12","4.4.0-1014.14","4.4.0-1016.16","4.4.0-1017.17","4.4.0-1019.19","4.4.0-1022.22","4.4.0-1023.23","4.4.0-1024.25","4.4.0-1025.26","4.4.0-1027.30","4.4.0-1028.31","4.4.0-1029.32","4.4.0-1031.34","4.4.0-1032.35","4.4.0-1034.37","4.4.0-1036.39","4.4.0-1037.40","4.4.0-1038.41","4.4.0-1039.42","4.4.0-1040.43","4.4.0-1042.45","4.4.0-1044.47","4.4.0-1045.48","4.4.0-1046.50","4.4.0-1048.52","4.4.0-1050.54","4.4.0-1052.56","4.4.0-1054.58","4.4.0-1055.59","4.4.0-1056.60","4.4.0-1058.62","4.4.0-1059.63","4.4.0-1060.64","4.4.0-1061.65","4.4.0-1062.66","4.4.0-1064.68","4.4.0-1065.69","4.4.0-1066.70","4.4.0-1067.71","4.4.0-1073.77","4.4.0-1074.78","4.4.0-1075.79","4.4.0-1076.80","4.4.0-1077.81","4.4.0-1078.82","4.4.0-1081.85","4.4.0-1082.86","4.4.0-1083.87","4.4.0-1085.89","4.4.0-1086.90","4.4.0-1087.91","4.4.0-1088.92","4.4.0-1090.94","4.4.0-1091.95","4.4.0-1092.96","4.4.0-1093.97","4.4.0-1094.99","4.4.0-1095.100","4.4.0-1096.101","4.4.0-1097.102","4.4.0-1098.103","4.4.0-1099.104","4.4.0-1101.106","4.4.0-1102.107","4.4.0-1103.108","4.4.0-1104.109","4.4.0-1107.113","4.4.0-1109.115","4.4.0-1110.116","4.4.0-1111.117","4.4.0-1112.118","4.4.0-1113.119","4.4.0-1114.120","4.4.0-1115.121","4.4.0-1116.122","4.4.0-1117.123","4.4.0-1118.124","4.4.0-1119.125","4.4.0-1120.126","4.4.0-1121.127","4.4.0-1122.128","4.4.0-1123.129","4.4.0-1124.130","4.4.0-1125.131","4.4.0-1127.133","4.4.0-1128.134","4.4.0-1129.135","4.4.0-1130.136","4.4.0-1131.137","4.4.0-1133.139","4.4.0-1134.140","4.4.0-1135.141","4.4.0-1136.142","4.4.0-1137.143","4.4.0-1138.144","4.4.0-1139.145","4.4.0-1140.146","4.4.0-1141.147","4.4.0-1142.148","4.4.0-1143.149"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro","binaries":[{"binary_version":"4.4.0-1144.150","binary_name":"linux-aws-cloud-tools-4.4.0-1144"},{"binary_version":"4.4.0-1144.150","binary_name":"linux-aws-headers-4.4.0-1144"},{"binary_version":"4.4.0-1144.150","binary_name":"linux-aws-tools-4.4.0-1144"},{"binary_version":"4.4.0-1144.150","binary_name":"linux-buildinfo-4.4.0-1144-aws"},{"binary_version":"4.4.0-1144.150","binary_name":"linux-cloud-tools-4.4.0-1144-aws"},{"binary_version":"4.4.0-1144.150","binary_name":"linux-headers-4.4.0-1144-aws"},{"binary_version":"4.4.0-1144.150","binary_name":"linux-image-4.4.0-1144-aws"},{"binary_version":"4.4.0-1144.150","binary_name":"linux-modules-4.4.0-1144-aws"},{"binary_version":"4.4.0-1144.150","binary_name":"linux-tools-4.4.0-1144-aws"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:14.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-47211"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-47353"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-52458"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-26966"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-42301"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-47701"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-53155"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2024-53168"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2024-56551"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2024-56596"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2024-57850"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7554-2.json"}},{"package":{"name":"linux-lts-xenial","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/linux-lts-xenial@4.4.0-269.303~14.04.1?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-269.303~14.04.1"}]}],"versions":["4.4.0-13.29~14.04.1","4.4.0-14.30~14.04.2","4.4.0-15.31~14.04.1","4.4.0-18.34~14.04.1","4.4.0-21.37~14.04.1","4.4.0-22.39~14.04.1","4.4.0-22.40~14.04.1","4.4.0-24.43~14.04.1","4.4.0-28.47~14.04.1","4.4.0-31.50~14.04.1","4.4.0-34.53~14.04.1","4.4.0-36.55~14.04.1","4.4.0-38.57~14.04.1","4.4.0-42.62~14.04.1","4.4.0-45.66~14.04.1","4.4.0-47.68~14.04.1","4.4.0-51.72~14.04.1","4.4.0-53.74~14.04.1","4.4.0-57.78~14.04.1","4.4.0-59.80~14.04.1","4.4.0-62.83~14.04.1","4.4.0-63.84~14.04.2","4.4.0-64.85~14.04.1","4.4.0-66.87~14.04.1","4.4.0-67.88~14.04.1","4.4.0-70.91~14.04.1","4.4.0-71.92~14.04.1","4.4.0-72.93~14.04.1","4.4.0-75.96~14.04.1","4.4.0-78.99~14.04.2","4.4.0-79.100~14.04.1","4.4.0-81.104~14.04.1","4.4.0-83.106~14.04.1","4.4.0-87.110~14.04.1","4.4.0-89.112~14.04.1","4.4.0-91.114~14.04.1","4.4.0-92.115~14.04.1","4.4.0-93.116~14.04.1","4.4.0-96.119~14.04.1","4.4.0-97.120~14.04.1","4.4.0-98.121~14.04.1","4.4.0-101.124~14.04.1","4.4.0-103.126~14.04.1","4.4.0-104.127~14.04.1","4.4.0-108.131~14.04.1","4.4.0-109.132~14.04.1","4.4.0-111.134~14.04.1","4.4.0-112.135~14.04.1","4.4.0-116.140~14.04.1","4.4.0-119.143~14.04.1","4.4.0-121.145~14.04.1","4.4.0-124.148~14.04.1","4.4.0-127.153~14.04.1","4.4.0-128.154~14.04.1","4.4.0-130.156~14.04.1","4.4.0-131.157~14.04.1","4.4.0-133.159~14.04.1","4.4.0-134.160~14.04.1","4.4.0-135.161~14.04.1","4.4.0-137.163~14.04.1","4.4.0-138.164~14.04.1","4.4.0-139.165~14.04.1","4.4.0-140.166~14.04.1","4.4.0-141.167~14.04.1","4.4.0-142.168~14.04.1","4.4.0-143.169~14.04.2","4.4.0-144.170~14.04.1","4.4.0-146.172~14.04.1","4.4.0-148.174~14.04.1","4.4.0-150.176~14.04.1","4.4.0-151.178~14.04.1","4.4.0-154.181~14.04.1","4.4.0-157.185~14.04.1","4.4.0-159.187~14.04.1","4.4.0-161.189~14.04.1","4.4.0-164.192~14.04.1","4.4.0-165.193~14.04.1","4.4.0-166.195~14.04.1","4.4.0-168.197~14.04.1","4.4.0-169.198~14.04.1","4.4.0-170.199~14.04.1","4.4.0-171.200~14.04.1","4.4.0-173.203~14.04.1","4.4.0-174.204~14.04.1","4.4.0-176.206~14.04.1","4.4.0-177.207~14.04.1","4.4.0-178.208~14.04.1","4.4.0-179.209~14.04.1","4.4.0-184.214~14.04.1","4.4.0-185.215~14.04.1","4.4.0-186.216~14.04.1","4.4.0-187.217~14.04.1","4.4.0-189.219~14.04.1","4.4.0-190.220~14.04.1","4.4.0-193.224~14.04.1","4.4.0-194.226~14.04.1","4.4.0-197.229~14.04.1","4.4.0-198.230~14.04.1","4.4.0-200.232~14.04.1","4.4.0-201.233~14.04.1","4.4.0-203.235~14.04.1","4.4.0-204.236~14.04.1","4.4.0-206.238~14.04.1","4.4.0-208.240~14.04.1","4.4.0-209.241~14.04.1","4.4.0-210.242~14.04.1","4.4.0-211.243~14.04.1","4.4.0-212.244~14.04.1","4.4.0-213.245~14.04.1","4.4.0-214.246~14.04.1","4.4.0-215.247~14.04.1","4.4.0-218.251~14.04.1","4.4.0-219.252~14.04.1","4.4.0-221.254~14.04.1","4.4.0-222.255~14.04.1","4.4.0-223.256~14.04.1","4.4.0-224.257~14.04.1","4.4.0-227.261~14.04.1","4.4.0-229.263~14.04.1","4.4.0-230.264~14.04.1","4.4.0-231.265~14.04.1","4.4.0-233.267~14.04.1","4.4.0-234.268~14.04.1","4.4.0-235.269~14.04.1","4.4.0-236.270~14.04.1","4.4.0-237.271~14.04.1","4.4.0-239.273~14.04.1","4.4.0-240.274~14.04.1","4.4.0-241.275~14.04.1","4.4.0-242.276~14.04.1","4.4.0-243.277~14.04.1","4.4.0-244.278~14.04.1","4.4.0-245.279~14.04.1","4.4.0-246.280~14.04.1","4.4.0-248.282~14.04.1","4.4.0-250.284~14.04.1","4.4.0-251.285~14.04.1","4.4.0-252.286~14.04.1","4.4.0-253.287~14.04.1","4.4.0-254.288~14.04.1","4.4.0-256.290~14.04.1","4.4.0-257.291~14.04.1","4.4.0-258.292~14.04.2","4.4.0-259.293~14.04.1","4.4.0-260.294~14.04.1","4.4.0-261.295~14.04.1","4.4.0-262.296~14.04.1","4.4.0-263.297~14.04.1","4.4.0-264.298~14.04.1","4.4.0-266.300~14.04.1","4.4.0-267.301~14.04.1","4.4.0-268.302~14.04.1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro","binaries":[{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"block-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"crypto-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"fat-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"fb-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"firewire-core-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"floppy-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"fs-core-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"fs-secondary-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"input-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"ipmi-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"irda-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"kernel-image-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"linux-buildinfo-4.4.0-269-generic"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"linux-buildinfo-4.4.0-269-lowlatency"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"linux-cloud-tools-4.4.0-269-generic"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"linux-cloud-tools-4.4.0-269-lowlatency"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"linux-headers-4.4.0-269"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"linux-headers-4.4.0-269-generic"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"linux-headers-4.4.0-269-lowlatency"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"linux-image-4.4.0-269-generic"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"linux-image-unsigned-4.4.0-269-generic"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"linux-image-unsigned-4.4.0-269-lowlatency"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"linux-lts-xenial-cloud-tools-4.4.0-269"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"linux-lts-xenial-tools-4.4.0-269"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"linux-lts-xenial-udebs-generic"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"linux-modules-4.4.0-269-generic"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"linux-modules-4.4.0-269-lowlatency"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"linux-modules-extra-4.4.0-269-generic"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"linux-tools-4.4.0-269-generic"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"linux-tools-4.4.0-269-lowlatency"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"md-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"message-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"mouse-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"multipath-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"nfs-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"nic-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"nic-pcmcia-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"nic-shared-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"nic-usb-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"parport-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"pata-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"pcmcia-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"pcmcia-storage-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"plip-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"ppp-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"sata-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"scsi-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"serial-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"speakup-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"storage-core-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"usb-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"virtio-modules-4.4.0-269-generic-di"},{"binary_version":"4.4.0-269.303~14.04.1","binary_name":"vlan-modules-4.4.0-269-generic-di"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:14.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-47211"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2021-47353"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-52458"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-26966"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-42301"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-47701"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-53155"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2024-53168"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2024-56551"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2024-56596"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2024-57850"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7554-2.json"}}],"schema_version":"1.7.3"}