{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "[ Ubuntu: 4.15.0-245.256 ]\n   * CVE-url: https://ubuntu.com/security/CVE-2024-50180\n     - fbdev: sisfb: Fix strbuf array overflow\n   * CVE-url: https://ubuntu.com/security/CVE-2023-52522\n     - net: fix possible store tearing in neigh_periodic_work()\n   * CVE-url: https://ubuntu.com/security/CVE-2024-40911\n     - wifi: cfg80211: Lock wiphy in cfg80211_get_station\n   * CVE-url: https://ubuntu.com/security/CVE-2024-43863\n     - drm/vmwgfx: Fix a deadlock in dma buf fence polling\n   * CVE-url: https://ubuntu.com/security/CVE-2024-44931\n     - gpio: prevent potential speculation leaks in gpio_device_get_desc()\n   * CVE-url: https://ubuntu.com/security/CVE-2024-23848\n     - media: cec: cec-api: add locking in cec_release()\n     - media: cec: core: avoid recursive cec_claim_log_addrs\n   * CVE-url: https://ubuntu.com/security/CVE-2024-50229\n     - nilfs2: fix potential deadlock with newly created symlinks\n   * CVE-url: https://ubuntu.com/security/CVE-2024-50171\n     - net: systemport: fix potential memory leak in bcm_sysport_xmit()\n   * CVE-url: https://ubuntu.com/security/CVE-2024-50233\n     - staging: iio: frequency: ad9832: fix division by zero in\n       ad9832_calc_freqreg()\n   * CVE-url: https://ubuntu.com/security/CVE-2024-50134\n     - drm/vboxvideo: Replace fake VLA at end of vbva_mouse_pointer_shape with real\n       VLA\n   * CVE-url: https://ubuntu.com/security/CVE-2024-44938\n     - jfs: Fix shift-out-of-bounds in dbDiscardAG\n   * CVE-url: https://ubuntu.com/security/CVE-2024-50117\n     - drm/amd: Guard against bad data for ATIF ACPI method\n   * CVE-url: https://ubuntu.com/security/CVE-2024-49902\n     - jfs: check if leafidx greater than num leaves per dmap tree\n   * CVE-url: https://ubuntu.com/security/CVE-2023-52799\n     - jfs: fix array-index-out-of-bounds in dbFindLeaf\n   * CVE-url: https://ubuntu.com/security/CVE-2024-49966\n     - ocfs2: cancel dqi_sync_work before freeing oinfo\n   * CVE-url: https://ubuntu.com/security/CVE-2024-50267\n     - USB: serial: io_edgeport: fix use after free in debug printk\n   * CVE-url: https://ubuntu.com/security/CVE-2024-50230\n     - nilfs2: fix kernel bug due to missing clearing of checked flag\n   * CVE-url: https://ubuntu.com/security/CVE-2024-50302\n     - HID: core: zero-initialize the report buffer\n   * CVE-url: https://ubuntu.com/security/CVE-2024-50278\n     - dm cache: fix out-of-bounds access to the dirty bitset when resizing\n     - dm cache: fix potential out-of-bounds access on the first resume\n   * CVE-url: https://ubuntu.com/security/CVE-2024-50234\n     - wifi: iwlegacy: Clear stale interrupts before resuming device\n   * CVE-url: https://ubuntu.com/security/CVE-2024-50301\n     - security/keys: fix slab-out-of-bounds in key_task_permission\n   * CVE-url: https://ubuntu.com/security/CVE-2024-50143\n     - overflow: Add __must_check attribute to check_*() helpers\n     - compiler.h: drop fallback overflow checkers\n     - overflow: Allow mixed type arguments\n     - udf: fix uninit-value use in udf_get_fileshortad\n   * CVE-url: https://ubuntu.com/security/CVE-2024-53061\n     - media: s5p-jpeg: prevent buffer overflows\n   * CVE-url: https://ubuntu.com/security/CVE-2024-57798\n     - drm/dp-mst-helper: Remove hotplug callback\n     - drm/dp_mst: Remove huge conditional in drm_dp_mst_handle_up_req()\n     - drm/dp_mst: Refactor drm_dp_mst_handle_up_req()\n     - drm/dp_mst: Rename drm_dp_add_port and drm_dp_update_port\n     - drm/dp_mst: Handle UP requests asynchronously\n     - drm/dp_mst: Ensure mst_primary pointer is valid in\n       drm_dp_mst_handle_up_req()\n   * CVE-url: https://ubuntu.com/security/CVE-2023-52854\n     - padata: make padata_do_parallel find alternate callback CPU\n     - padata: allocate workqueue internally\n     - crypto: pcrypt - remove padata cpumask notifier\n     - padata, pcrypt: take CPU hotplug lock internally in padata_alloc_possible\n     - padata: use separate workqueues for parallel and serial work\n     - padata: unbind parallel jobs from specific CPUs\n     - workqueue: Make alloc/apply/free_workqueue_attrs() static\n     - workqueue: Remove GPF argument from alloc_workqueue_attrs()\n     - workqueue: unconfine alloc/apply/free_workqueue_attrs()\n     - crypto: pcrypt - Avoid deadlock by using per-instance padata queues\n     - crypto: aead - pass instance to crypto_grab_aead()\n     - crypto: pcrypt - simplify error handling in pcrypt_create_aead()\n     - padata: Fix refcnt handling in padata_free_shell()\n   * CVE-url: https://ubuntu.com/security/CVE-2024-53164\n     - net: sched: fix ordering of qlen adjustment\n   * CVE-url: https://ubuntu.com/security/CVE-2024-47809\n     - dlm: fix possible lkb_resource null dereference\n   * CVE-url: https://ubuntu.com/security/CVE-2021-47342\n     - ext4: fix memory leak in ext4_fill_super\n     - ext4: fix possible UAF when remounting r/o a mmp-protected file system\n   * CVE-url: https://ubuntu.com/security/CVE-2024-53179\n     - smb: client: fix use-after-free of signing key\n   * Miscellaneous upstream changes\n     - drm/amd/amdgpu: Fix GPR read from debugfs (v2)",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/ubuntu16.04els/advisories/2025/clsa-2025_1742321198.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2025:1742321198",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1742321198"
      }
    ],
    "tracking": {
      "current_release_date": "2025-05-19T15:20:19Z",
      "generator": {
        "date": "2025-05-19T15:20:19Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1742321198",
      "initial_release_date": "2025-03-18T14:06:41Z",
      "revision_history": [
        {
          "date": "2025-03-18T14:06:41Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-05-19T15:20:19Z",
          "number": "2",
          "summary": "Official Publication"
        }
      ],
      "status": "final",
      "version": "2"
    },
    "title": "Fix of 29 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Ubuntu 16.04",
                "product": {
                  "name": "Ubuntu 16.04",
                  "product_id": "Ubuntu-16",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Ubuntu"
          }
        ],
        "category": "vendor",
        "name": "Canonical Ltd."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "linux-headers-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
                "product": {
                  "name": "linux-headers-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
                  "product_id": "linux-headers-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-headers-4.15.0-245-tuxcare.els43-lowlatency@4.15.0-245.256~16.04.1?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-modules-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
                "product": {
                  "name": "linux-modules-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
                  "product_id": "linux-modules-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-modules-4.15.0-245-tuxcare.els43-generic@4.15.0-245.256~16.04.1?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
                "product": {
                  "name": "linux-tools-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
                  "product_id": "linux-tools-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-tools-4.15.0-245-tuxcare.els43-lowlatency@4.15.0-245.256~16.04.1?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-modules-extra-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
                "product": {
                  "name": "linux-modules-extra-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
                  "product_id": "linux-modules-extra-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-modules-extra-4.15.0-245-tuxcare.els43-generic@4.15.0-245.256~16.04.1?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-cloud-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
                "product": {
                  "name": "linux-cloud-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
                  "product_id": "linux-cloud-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-cloud-tools-4.15.0-245-tuxcare.els43-generic@4.15.0-245.256~16.04.1?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43-0:4.15.0-245.256~16.04.1.amd64",
                "product": {
                  "name": "linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43-0:4.15.0-245.256~16.04.1.amd64",
                  "product_id": "linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43-0:4.15.0-245.256~16.04.1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43@4.15.0-245.256~16.04.1?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-headers-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
                "product": {
                  "name": "linux-headers-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
                  "product_id": "linux-headers-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-headers-4.15.0-245-tuxcare.els43-generic@4.15.0-245.256~16.04.1?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
                "product": {
                  "name": "linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
                  "product_id": "linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency@4.15.0-245.256~16.04.1?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-image-unsigned-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
                "product": {
                  "name": "linux-image-unsigned-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
                  "product_id": "linux-image-unsigned-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-image-unsigned-4.15.0-245-tuxcare.els43-generic@4.15.0-245.256~16.04.1?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
                "product": {
                  "name": "linux-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
                  "product_id": "linux-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-tools-4.15.0-245-tuxcare.els43-generic@4.15.0-245.256~16.04.1?arch=amd64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          }
        ],
        "category": "vendor",
        "name": "CloudLinux"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-headers-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64"
        },
        "product_reference": "linux-headers-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-modules-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-modules-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64"
        },
        "product_reference": "linux-modules-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64"
        },
        "product_reference": "linux-tools-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-modules-extra-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-modules-extra-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64"
        },
        "product_reference": "linux-modules-extra-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-cloud-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-cloud-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64"
        },
        "product_reference": "linux-cloud-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43-0:4.15.0-245.256~16.04.1.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43-0:4.15.0-245.256~16.04.1.amd64"
        },
        "product_reference": "linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43-0:4.15.0-245.256~16.04.1.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-headers-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64"
        },
        "product_reference": "linux-headers-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64"
        },
        "product_reference": "linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-image-unsigned-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-image-unsigned-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64"
        },
        "product_reference": "linux-image-unsigned-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64"
        },
        "product_reference": "linux-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-52854",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npadata: Fix refcnt handling in padata_free_shell()\n\nIn a high-load arm64 environment, the pcrypt_aead01 test in LTP can lead\nto system UAF (Use-After-Free) issues. Due to the lengthy analysis of\nthe pcrypt_aead01 function call, I'll describe the problem scenario\nusing a simplified model:\n\nSuppose there's a user of padata named `user_function` that adheres to\nthe padata requirement of calling `padata_free_shell` after `serial()`\nhas been invoked, as demonstrated in the following code:\n\n```c\nstruct request {\n    struct padata_priv padata;\n    struct completion *done;\n};\n\nvoid parallel(struct padata_priv *padata) {\n    do_something();\n}\n\nvoid serial(struct padata_priv *padata) {\n    struct request *request = container_of(padata,\n    \t\t\t\tstruct request,\n\t\t\t\tpadata);\n    complete(request->done);\n}\n\nvoid user_function() {\n    DECLARE_COMPLETION(done)\n    padata->parallel = parallel;\n    padata->serial = serial;\n    padata_do_parallel();\n    wait_for_completion(&done);\n    padata_free_shell();\n}\n```\n\nIn the corresponding padata.c file, there's the following code:\n\n```c\nstatic void padata_serial_worker(struct work_struct *serial_work) {\n    ...\n    cnt = 0;\n\n    while (!list_empty(&local_list)) {\n        ...\n        padata->serial(padata);\n        cnt++;\n    }\n\n    local_bh_enable();\n\n    if (refcount_sub_and_test(cnt, &pd->refcnt))\n        padata_free_pd(pd);\n}\n```\n\nBecause of the high system load and the accumulation of unexecuted\nsoftirq at this moment, `local_bh_enable()` in padata takes longer\nto execute than usual. Subsequently, when accessing `pd->refcnt`,\n`pd` has already been released by `padata_free_shell()`, resulting\nin a UAF issue with `pd->refcnt`.\n\nThe fix is straightforward: add `refcount_dec_and_test` before calling\n`padata_free_pd` in `padata_free_shell`.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-52854"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0dd34a7ad395dbcf6ae60e48e9786050e25b9bc5",
          "url": "https://git.kernel.org/stable/c/0dd34a7ad395dbcf6ae60e48e9786050e25b9bc5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1734a79e951914f1db2c65e635012a35db1c674b",
          "url": "https://git.kernel.org/stable/c/1734a79e951914f1db2c65e635012a35db1c674b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1e901bcb8af19416b65f5063a4af7996e5a51d7f",
          "url": "https://git.kernel.org/stable/c/1e901bcb8af19416b65f5063a4af7996e5a51d7f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/41aad9d6953984d134fc50f631f24ef476875d4d",
          "url": "https://git.kernel.org/stable/c/41aad9d6953984d134fc50f631f24ef476875d4d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7ddc21e317b360c3444de3023bcc83b85fabae2f",
          "url": "https://git.kernel.org/stable/c/7ddc21e317b360c3444de3023bcc83b85fabae2f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c7c26d0ef5d20f00dbb2ae3befcabbe0efa77275",
          "url": "https://git.kernel.org/stable/c/c7c26d0ef5d20f00dbb2ae3befcabbe0efa77275"
        }
      ],
      "release_date": "2024-05-21T16:15:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2024-50301",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsecurity/keys: fix slab-out-of-bounds in key_task_permission\n\nKASAN reports an out of bounds read:\nBUG: KASAN: slab-out-of-bounds in __kuid_val include/linux/uidgid.h:36\nBUG: KASAN: slab-out-of-bounds in uid_eq include/linux/uidgid.h:63 [inline]\nBUG: KASAN: slab-out-of-bounds in key_task_permission+0x394/0x410\nsecurity/keys/permission.c:54\nRead of size 4 at addr ffff88813c3ab618 by task stress-ng/4362\n\nCPU: 2 PID: 4362 Comm: stress-ng Not tainted 5.10.0-14930-gafbffd6c3ede #15\nCall Trace:\n __dump_stack lib/dump_stack.c:82 [inline]\n dump_stack+0x107/0x167 lib/dump_stack.c:123\n print_address_description.constprop.0+0x19/0x170 mm/kasan/report.c:400\n __kasan_report.cold+0x6c/0x84 mm/kasan/report.c:560\n kasan_report+0x3a/0x50 mm/kasan/report.c:585\n __kuid_val include/linux/uidgid.h:36 [inline]\n uid_eq include/linux/uidgid.h:63 [inline]\n key_task_permission+0x394/0x410 security/keys/permission.c:54\n search_nested_keyrings+0x90e/0xe90 security/keys/keyring.c:793\n\nThis issue was also reported by syzbot.\n\nIt can be reproduced by following these steps(more details [1]):\n1. Obtain more than 32 inputs that have similar hashes, which ends with the\n   pattern '0xxxxxxxe6'.\n2. Reboot and add the keys obtained in step 1.\n\nThe reproducer demonstrates how this issue happened:\n1. In the search_nested_keyrings function, when it iterates through the\n   slots in a node(below tag ascend_to_node), if the slot pointer is meta\n   and node->back_pointer != NULL(it means a root), it will proceed to\n   descend_to_node. However, there is an exception. If node is the root,\n   and one of the slots points to a shortcut, it will be treated as a\n   keyring.\n2. Whether the ptr is keyring decided by keyring_ptr_is_keyring function.\n   However, KEYRING_PTR_SUBTYPE is 0x2UL, the same as\n   ASSOC_ARRAY_PTR_SUBTYPE_MASK.\n3. When 32 keys with the similar hashes are added to the tree, the ROOT\n   has keys with hashes that are not similar (e.g. slot 0) and it splits\n   NODE A without using a shortcut. When NODE A is filled with keys that\n   all hashes are xxe6, the keys are similar, NODE A will split with a\n   shortcut. Finally, it forms the tree as shown below, where slot 6 points\n   to a shortcut.\n\n                      NODE A\n              +------>+---+\n      ROOT    |       | 0 | xxe6\n      +---+   |       +---+\n xxxx | 0 | shortcut  :   : xxe6\n      +---+   |       +---+\n xxe6 :   :   |       |   | xxe6\n      +---+   |       +---+\n      | 6 |---+       :   : xxe6\n      +---+           +---+\n xxe6 :   :           | f | xxe6\n      +---+           +---+\n xxe6 | f |\n      +---+\n\n4. As mentioned above, If a slot(slot 6) of the root points to a shortcut,\n   it may be mistakenly transferred to a key*, leading to a read\n   out-of-bounds read.\n\nTo fix this issue, one should jump to descend_to_node if the ptr is a\nshortcut, regardless of whether the node is root or not.\n\n[1] https://lore.kernel.org/linux-kernel/1cfa878e-8c7b-4570-8606-21daf5e13ce7@huaweicloud.com/\n\n[jarkko: tweaked the commit message a bit to have an appropriate closes\n tag.]",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-50301"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/199c20fb7499c79557a075dc24e9a7dae7d9f1ce",
          "url": "https://git.kernel.org/stable/c/199c20fb7499c79557a075dc24e9a7dae7d9f1ce"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1e4332581cd4eed75aea77af6f66cdcdda8b49b9",
          "url": "https://git.kernel.org/stable/c/1e4332581cd4eed75aea77af6f66cdcdda8b49b9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3e79ad156bedf2da0ab909a118d2cec6c9c22b79",
          "url": "https://git.kernel.org/stable/c/3e79ad156bedf2da0ab909a118d2cec6c9c22b79"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4a74da044ec9ec8679e6beccc4306b936b62873f",
          "url": "https://git.kernel.org/stable/c/4a74da044ec9ec8679e6beccc4306b936b62873f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4efb69a0e294ef201bcdf7ce3d6202cd0a545a5d",
          "url": "https://git.kernel.org/stable/c/4efb69a0e294ef201bcdf7ce3d6202cd0a545a5d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bbad2d5b6c99db468d8f88b6ba6a56ed409b4881",
          "url": "https://git.kernel.org/stable/c/bbad2d5b6c99db468d8f88b6ba6a56ed409b4881"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c3ce634ad953ce48c75c39bdfd8b711dd95f346f",
          "url": "https://git.kernel.org/stable/c/c3ce634ad953ce48c75c39bdfd8b711dd95f346f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e0a317ad68e4ea48a0158187238c5407e4fdec8b",
          "url": "https://git.kernel.org/stable/c/e0a317ad68e4ea48a0158187238c5407e4fdec8b"
        }
      ],
      "release_date": "2024-11-19T02:16:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2023-52799",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: fix array-index-out-of-bounds in dbFindLeaf\n\nCurrently while searching for dmtree_t for sufficient free blocks there\nis an array out of bounds while getting element in tp->dm_stree. To add\nthe required check for out of bound we first need to determine the type\nof dmtree. Thus added an extra parameter to dbFindLeaf so that the type\nof tree can be determined and the required check can be applied.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-52799"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/20f9310a18e3e99fc031e036fcbed67105ae1859",
          "url": "https://git.kernel.org/stable/c/20f9310a18e3e99fc031e036fcbed67105ae1859"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/22cad8bc1d36547cdae0eef316c47d917ce3147c",
          "url": "https://git.kernel.org/stable/c/22cad8bc1d36547cdae0eef316c47d917ce3147c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/81aa58cd8495b8c3b527f58ccbe19478d8087f61",
          "url": "https://git.kernel.org/stable/c/81aa58cd8495b8c3b527f58ccbe19478d8087f61"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/86df90f3fea7c5591f05c8a0010871d435e83046",
          "url": "https://git.kernel.org/stable/c/86df90f3fea7c5591f05c8a0010871d435e83046"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/87c681ab49e99039ff2dd3e71852417381b13878",
          "url": "https://git.kernel.org/stable/c/87c681ab49e99039ff2dd3e71852417381b13878"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/88b7894a8f8705bf4e7ea90b10229376abf14514",
          "url": "https://git.kernel.org/stable/c/88b7894a8f8705bf4e7ea90b10229376abf14514"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a50b796d36719757526ee094c703378895ab5e67",
          "url": "https://git.kernel.org/stable/c/a50b796d36719757526ee094c703378895ab5e67"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/da3da5e1e6f71c21d8e6149d7076d936ef5d4cb9",
          "url": "https://git.kernel.org/stable/c/da3da5e1e6f71c21d8e6149d7076d936ef5d4cb9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ecfb47f13b08b02cf28b7b50d4941eefa21954d2",
          "url": "https://git.kernel.org/stable/c/ecfb47f13b08b02cf28b7b50d4941eefa21954d2"
        }
      ],
      "release_date": "2024-05-21T16:15:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2024-50171",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: systemport: fix potential memory leak in bcm_sysport_xmit()\n\nThe bcm_sysport_xmit() returns NETDEV_TX_OK without freeing skb\nin case of dma_map_single() fails, add dev_kfree_skb() to fix it.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-50171"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/31701ef0c4547973991ff63596c927f841dfd133",
          "url": "https://git.kernel.org/stable/c/31701ef0c4547973991ff63596c927f841dfd133"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4b70478b984af3c9d0279c121df5ff94e2533dbd",
          "url": "https://git.kernel.org/stable/c/4b70478b984af3c9d0279c121df5ff94e2533dbd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/533d2f30aef272dade17870a509521c3afc38a03",
          "url": "https://git.kernel.org/stable/c/533d2f30aef272dade17870a509521c3afc38a03"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5febfc545389805ce83d37f9f4317055b26dd7d7",
          "url": "https://git.kernel.org/stable/c/5febfc545389805ce83d37f9f4317055b26dd7d7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7d5030a819c3589cf9948b1eee397b626ec590f5",
          "url": "https://git.kernel.org/stable/c/7d5030a819c3589cf9948b1eee397b626ec590f5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8e81ce7d0166a2249deb6d5e42f28a8b8c9ea72f",
          "url": "https://git.kernel.org/stable/c/8e81ce7d0166a2249deb6d5e42f28a8b8c9ea72f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b6321146773dcbbc372a54dbada67e0b50e0a25c",
          "url": "https://git.kernel.org/stable/c/b6321146773dcbbc372a54dbada67e0b50e0a25c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c401ed1c709948e57945485088413e1bb5e94bd1",
          "url": "https://git.kernel.org/stable/c/c401ed1c709948e57945485088413e1bb5e94bd1"
        }
      ],
      "release_date": "2024-11-07T10:15:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Medium"
        }
      ]
    },
    {
      "cve": "CVE-2023-52522",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nnet: fix possible store tearing in neigh_periodic_work()\nWhile looking at a related syzbot report involving neigh_periodic_work(),\nI found that I forgot to add an annotation when deleting an\nRCU protected item from a list.\nReaders use rcu_deference(*np), we need to use either\nrcu_assign_pointer() or WRITE_ONCE() on writer side\nto prevent store tearing.\nI use rcu_assign_pointer() to have lockdep support,\nthis was the choice made in neigh_flush_dev().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-52522"
        }
      ],
      "release_date": "2024-03-02T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Medium"
        }
      ]
    },
    {
      "cve": "CVE-2024-50267",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: serial: io_edgeport: fix use after free in debug printk\n\nThe \"dev_dbg(&urb->dev->dev, ...\" which happens after usb_free_urb(urb)\nis a use after free of the \"urb\" pointer.  Store the \"dev\" pointer at the\nstart of the function to avoid this issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-50267"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/13d6ff3ca76056d06a9d88300be2a293442ff595",
          "url": "https://git.kernel.org/stable/c/13d6ff3ca76056d06a9d88300be2a293442ff595"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/275258c30bbda29467216e96fb655b16bcc9992b",
          "url": "https://git.kernel.org/stable/c/275258c30bbda29467216e96fb655b16bcc9992b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/314bdf446053e123f37543aa535197ee75f8aa97",
          "url": "https://git.kernel.org/stable/c/314bdf446053e123f37543aa535197ee75f8aa97"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/37bb5628379295c1254c113a407cab03a0f4d0b4",
          "url": "https://git.kernel.org/stable/c/37bb5628379295c1254c113a407cab03a0f4d0b4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/39709ce93f5c3f9eb535efe2afea088805d1128f",
          "url": "https://git.kernel.org/stable/c/39709ce93f5c3f9eb535efe2afea088805d1128f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/44fff2c16c5aafbdb70c7183dae0a415ae74705e",
          "url": "https://git.kernel.org/stable/c/44fff2c16c5aafbdb70c7183dae0a415ae74705e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e567fc8f7a4460e486e52c9261b1e8b9f5dc42aa",
          "url": "https://git.kernel.org/stable/c/e567fc8f7a4460e486e52c9261b1e8b9f5dc42aa"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e6ceb04eeb6115d872d4c4078d12f1170ed755ce",
          "url": "https://git.kernel.org/stable/c/e6ceb04eeb6115d872d4c4078d12f1170ed755ce"
        }
      ],
      "release_date": "2024-11-19T02:16:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2024-50230",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix kernel bug due to missing clearing of checked flag\n\nSyzbot reported that in directory operations after nilfs2 detects\nfilesystem corruption and degrades to read-only,\n__block_write_begin_int(), which is called to prepare block writes, may\nfail the BUG_ON check for accesses exceeding the folio/page size,\ntriggering a kernel bug.\n\nThis was found to be because the \"checked\" flag of a page/folio was not\ncleared when it was discarded by nilfs2's own routine, which causes the\nsanity check of directory entries to be skipped when the directory\npage/folio is reloaded.  So, fix that.\n\nThis was necessary when the use of nilfs2's own page discard routine was\napplied to more than just metadata files.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-50230"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/41e192ad2779cae0102879612dfe46726e4396aa",
          "url": "https://git.kernel.org/stable/c/41e192ad2779cae0102879612dfe46726e4396aa"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/56c6171932a7fb267ac6cb4ff8759b93ee1d0e2e",
          "url": "https://git.kernel.org/stable/c/56c6171932a7fb267ac6cb4ff8759b93ee1d0e2e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/64afad73e4623308d8943645e5631f2c7a2d7971",
          "url": "https://git.kernel.org/stable/c/64afad73e4623308d8943645e5631f2c7a2d7971"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/994b2fa13a6c9cf3feca93090a9c337d48e3d60d",
          "url": "https://git.kernel.org/stable/c/994b2fa13a6c9cf3feca93090a9c337d48e3d60d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/aa0cee46c5d3fd9a39575a4c8a4f65f25f095b89",
          "url": "https://git.kernel.org/stable/c/aa0cee46c5d3fd9a39575a4c8a4f65f25f095b89"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cd0cdb51b15203fa27d4b714be83b7dfffa0b752",
          "url": "https://git.kernel.org/stable/c/cd0cdb51b15203fa27d4b714be83b7dfffa0b752"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f05dbebb8ee34882505d53d83af7d18f28a49248",
          "url": "https://git.kernel.org/stable/c/f05dbebb8ee34882505d53d83af7d18f28a49248"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f2f1fa446676c21edb777e6d2bc4fa8f956fab68",
          "url": "https://git.kernel.org/stable/c/f2f1fa446676c21edb777e6d2bc4fa8f956fab68"
        }
      ],
      "release_date": "2024-11-09T11:15:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2024-49902",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: check if leafidx greater than num leaves per dmap tree\n\nsyzbot report a out of bounds in dbSplit, it because dmt_leafidx greater\nthan num leaves per dmap tree, add a checking for dmt_leafidx in dbFindLeaf.\n\nShaggy:\nModified sanity check to apply to control pages as well as leaf pages.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-49902"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/058aa89b3318be3d66a103ba7c68d717561e1dc6",
          "url": "https://git.kernel.org/stable/c/058aa89b3318be3d66a103ba7c68d717561e1dc6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2451e5917c56be45d4add786e2a059dd9c2c37c4",
          "url": "https://git.kernel.org/stable/c/2451e5917c56be45d4add786e2a059dd9c2c37c4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/25d2a3ff02f22e215ce53355619df10cc5faa7ab",
          "url": "https://git.kernel.org/stable/c/25d2a3ff02f22e215ce53355619df10cc5faa7ab"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/35b91f15f44ce3c01eba058ccb864bb04743e792",
          "url": "https://git.kernel.org/stable/c/35b91f15f44ce3c01eba058ccb864bb04743e792"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4a7bf6a01fb441009a6698179a739957efd88e38",
          "url": "https://git.kernel.org/stable/c/4a7bf6a01fb441009a6698179a739957efd88e38"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7fff9a9f866e99931cf6fa260288e55d01626582",
          "url": "https://git.kernel.org/stable/c/7fff9a9f866e99931cf6fa260288e55d01626582"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cb0eb10558802764f07de1dc439c4609e27cb4f0",
          "url": "https://git.kernel.org/stable/c/cb0eb10558802764f07de1dc439c4609e27cb4f0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d64ff0d2306713ff084d4b09f84ed1a8c75ecc32",
          "url": "https://git.kernel.org/stable/c/d64ff0d2306713ff084d4b09f84ed1a8c75ecc32"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d76b9a4c283c7535ae7c7c9b14984e75402951e1",
          "url": "https://git.kernel.org/stable/c/d76b9a4c283c7535ae7c7c9b14984e75402951e1"
        }
      ],
      "release_date": "2024-10-21T18:15:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Medium"
        }
      ]
    },
    {
      "cve": "CVE-2024-47809",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndlm: fix possible lkb_resource null dereference\n\nThis patch fixes a possible null pointer dereference when this function is\ncalled from request_lock() as lkb->lkb_resource is not assigned yet,\nonly after validate_lock_args() by calling attach_lkb(). Another issue\nis that a resource name could be a non printable bytearray and we cannot\nassume to be ASCII coded.\n\nThe log functionality is probably never being hit when DLM is used in\nnormal way and no debug logging is enabled. The null pointer dereference\ncan only occur on a new created lkb that does not have the resource\nassigned yet, it probably never hits the null pointer dereference but we\nshould be sure that other changes might not change this behaviour and we\nactually can hit the mentioned null pointer dereference.\n\nIn this patch we just drop the printout of the resource name, the lkb id\nis enough to make a possible connection to a resource name if this\nexists.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-47809"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2db11504ef82a60c1a2063ba7431a5cd013ecfcb",
          "url": "https://git.kernel.org/stable/c/2db11504ef82a60c1a2063ba7431a5cd013ecfcb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6fbdc3980b70e9c1c86eccea7d5ee68108008fa7",
          "url": "https://git.kernel.org/stable/c/6fbdc3980b70e9c1c86eccea7d5ee68108008fa7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b98333c67daf887c724cd692e88e2db9418c0861",
          "url": "https://git.kernel.org/stable/c/b98333c67daf887c724cd692e88e2db9418c0861"
        }
      ],
      "release_date": "2025-01-11T13:15:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Medium"
        }
      ]
    },
    {
      "cve": "CVE-2024-50278",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm cache: fix potential out-of-bounds access on the first resume\n\nOut-of-bounds access occurs if the fast device is expanded unexpectedly\nbefore the first-time resume of the cache table. This happens because\nexpanding the fast device requires reloading the cache table for\ncache_create to allocate new in-core data structures that fit the new\nsize, and the check in cache_preresume is not performed during the\nfirst resume, leading to the issue.\n\nReproduce steps:\n\n1. prepare component devices:\n\ndmsetup create cmeta --table \"0 8192 linear /dev/sdc 0\"\ndmsetup create cdata --table \"0 65536 linear /dev/sdc 8192\"\ndmsetup create corig --table \"0 524288 linear /dev/sdc 262144\"\ndd if=/dev/zero of=/dev/mapper/cmeta bs=4k count=1 oflag=direct\n\n2. load a cache table of 512 cache blocks, and deliberately expand the\n   fast device before resuming the cache, making the in-core data\n   structures inadequate.\n\ndmsetup create cache --notable\ndmsetup reload cache --table \"0 524288 cache /dev/mapper/cmeta \\\n/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0\"\ndmsetup reload cdata --table \"0 131072 linear /dev/sdc 8192\"\ndmsetup resume cdata\ndmsetup resume cache\n\n3. suspend the cache to write out the in-core dirty bitset and hint\n   array, leading to out-of-bounds access to the dirty bitset at offset\n   0x40:\n\ndmsetup suspend cache\n\nKASAN reports:\n\n  BUG: KASAN: vmalloc-out-of-bounds in is_dirty_callback+0x2b/0x80\n  Read of size 8 at addr ffffc90000085040 by task dmsetup/90\n\n  (...snip...)\n  The buggy address belongs to the virtual mapping at\n   [ffffc90000085000, ffffc90000087000) created by:\n   cache_ctr+0x176a/0x35f0\n\n  (...snip...)\n  Memory state around the buggy address:\n   ffffc90000084f00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n   ffffc90000084f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n  >ffffc90000085000: 00 00 00 00 00 00 00 00 f8 f8 f8 f8 f8 f8 f8 f8\n                                             ^\n   ffffc90000085080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n   ffffc90000085100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n\nFix by checking the size change on the first resume.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-modules-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-modules-extra-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-cloud-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-image-unsigned-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
          "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-50278"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/036dd6e3d2638103e0092864577ea1d091466b86",
          "url": "https://git.kernel.org/stable/c/036dd6e3d2638103e0092864577ea1d091466b86"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/13ed3624c6ef283acefa4cc42cc8ae54fd4391a4",
          "url": "https://git.kernel.org/stable/c/13ed3624c6ef283acefa4cc42cc8ae54fd4391a4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2222b0929d00e2d13732b799b63be391b5de4492",
          "url": "https://git.kernel.org/stable/c/2222b0929d00e2d13732b799b63be391b5de4492"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/483b7261b35a9d369082ab298a6670912243f0be",
          "url": "https://git.kernel.org/stable/c/483b7261b35a9d369082ab298a6670912243f0be"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c0ade5d98979585d4f5a93e4514c2e9a65afa08d",
          "url": "https://git.kernel.org/stable/c/c0ade5d98979585d4f5a93e4514c2e9a65afa08d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c52ec00cb2f9bebfada22edcc0db385b910a1cdb",
          "url": "https://git.kernel.org/stable/c/c52ec00cb2f9bebfada22edcc0db385b910a1cdb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e492f71854ce03474d49e87fd98b8df1f7cd1d2d",
          "url": "https://git.kernel.org/stable/c/e492f71854ce03474d49e87fd98b8df1f7cd1d2d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fdef3b94dfebd57e3077a578b6e309a2bb6fa688",
          "url": "https://git.kernel.org/stable/c/fdef3b94dfebd57e3077a578b6e309a2bb6fa688"
        }
      ],
      "release_date": "2024-11-19T02:16:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-modules-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-modules-extra-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-cloud-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-hwe-cloud-tools-4.15.0-245-tuxcare.els43-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-headers-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-buildinfo-4.15.0-245-tuxcare.els43-lowlatency-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-image-unsigned-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64",
            "Ubuntu-16:linux-tools-4.15.0-245-tuxcare.els43-generic-0:4.15.0-245.256~16.04.1.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    }
  ]
}