{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "* CVE-url: https://ubuntu.com/security/CVE-2024-26872\n     - RDMA/srpt: Do not register event handler until srpt device is fully setup\n   * CVE-url: https://ubuntu.com/security/CVE-2024-53179\n     - smb: client: fix use-after-free of signing key\n   * CVE-url: https://ubuntu.com/security/CVE-2021-47357\n     - atm: iphase: fix possible use-after-free in ia_module_exit()\n   * Bionic update: upstream stable patchset 2022-11-15 (LP: #1996650) // CVE-\n     url: https://ubuntu.com/security/CVE-2021-47103\n     - inet: fully convert sk->sk_rx_dst to RCU rules\n   * CVE-url: https://ubuntu.com/security/CVE-2025-21858\n     - geneve: Fix use-after-free in geneve_find_dev().\n   * CVE-url: https://ubuntu.com/security/CVE-2024-36921\n     - wifi: iwlwifi: mvm: guard against invalid STA ID on removal\n   * Bionic update: upstream stable patchset 2022-07-25 (LP: #1982782) // CVE-\n     url: https://ubuntu.com/security/CVE-2022-49478\n     - media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init\n   * CVE-url: https://ubuntu.com/security/CVE-2023-52621\n     - bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers\n   * CVE-url: https://ubuntu.com/security/CVE-2025-21855\n     - ibmvnic: Don't reference skb after sending to VIOS\n   * CVE-url: https://ubuntu.com/security/CVE-2021-47110\n     - x86/kvm: Disable kvmclock on all CPUs on shutdown\n   * CVE-url: https://ubuntu.com/security/CVE-2024-57980\n     - media: uvcvideo: Fix double free in error path\n   * CVE-url: https://ubuntu.com/security/CVE-2025-21718\n     - net: rose: fix timer races against user threads\n   * CVE-url: https://ubuntu.com/security/CVE-2025-21735\n     - NFC: nci: Add bounds checking in nci_hci_create_pipe()\n   * CVE-url: https://ubuntu.com/security/CVE-2023-52805\n     - jfs: fix array-index-out-of-bounds in diAlloc\n   * CVE-url: https://ubuntu.com/security/CVE-2023-52847\n     - media: bttv: fix use after free error due to btv->timeout timer\n   * CVE-url: https://ubuntu.com/security/CVE-2024-41014\n     - xfs: add bounds checking to xlog_recover_process_data\n   * Bionic update: upstream stable patchset 2022-10-18 (LP: #1993349) // CVE-\n     url: https://ubuntu.com/security/CVE-2022-48702\n     - ALSA: emu10k1: Fix out of bounds access in snd_emu10k1_pcm_channel_alloc()\n   * Bionic update: upstream stable patchset 2022-10-18 (LP: #1993349) // CVE-\n     url: https://ubuntu.com/security/CVE-2022-48701\n     - ALSA: usb-audio: Fix an out-of-bounds bug in\n       __snd_usb_parse_audio_interface()\n   * CVE-url: https://ubuntu.com/security/CVE-2024-26982\n     - Squashfs: check the inode number is not the invalid value of zero\n   * CVE-url: https://ubuntu.com/security/CVE-2024-56548\n     - hfsplus: don't query the device logical block size multiple times\n   * CVE-url: https://ubuntu.com/security/CVE-2024-57850\n     - jffs2: Prevent rtime decompress memory corruption\n   * CVE-url: https://ubuntu.com/security/CVE-2024-49982\n     - aoe: fix the potential use-after-free problem in more places\n   * CVE-url: https://ubuntu.com/security/CVE-2025-21687\n     - vfio/platform: check the bounds of read/write syscalls\n   * CVE-url: https://ubuntu.com/security/CVE-2024-56539\n     - wifi: mwifiex: Fix memcpy() field-spanning write warning in\n       mwifiex_config_scan()\n   * CVE-url: https://ubuntu.com/security/CVE-2024-53680\n     - ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init()\n   * CVE-url: https://ubuntu.com/security/CVE-2024-56630\n     - ocfs2: free inode when ocfs2_get_init_inode() fails\n   * CVE-url: https://ubuntu.com/security/CVE-2024-53184\n     - um: ubd: Do not use drvdata in release\n   * CVE-url: https://ubuntu.com/security/CVE-2024-57884\n     - mm: vmscan: account for free pages to prevent infinite Loop in\n       throttle_direct_reclaim()\n   * CVE-url: https://ubuntu.com/security/CVE-2024-56597\n     - jfs: fix shift-out-of-bounds in dbSplit\n   * CVE-url: https://ubuntu.com/security/CVE-2025-21664\n     - dm thin: make get_first_thin use rcu-safe list first function\n   * CVE-url: https://ubuntu.com/security/CVE-2024-56594\n     - drm/amdgpu: set the right AMDGPU sg segment limitation\n   * CVE-url: https://ubuntu.com/security/CVE-2024-52332\n     - igb: Fix potential invalid memory access in igb_init_module()\n   * CVE-url: https://ubuntu.com/security/CVE-2024-53172\n     - ubi: fastmap: Fix duplicate slab cache names while attaching\n   * CVE-url: https://ubuntu.com/security/CVE-2024-56532\n     - ALSA: us122l: Use snd_card_free_when_closed() at disconnection\n   * CVE-url: https://ubuntu.com/security/CVE-2024-53183\n     - um: net: Do not use drvdata in release\n   * CVE-url: https://ubuntu.com/security/CVE-2024-57948\n     - mac802154: check local interfaces before deleting sdata list\n   * CVE-url: https://ubuntu.com/security/CVE-2024-57904\n     - iio: adc: at91: call input_free_device() on allocated iio_dev\n   * CVE-url: https://ubuntu.com/security/CVE-2024-56637\n     - netfilter: ipset: Hold module reference while requesting a module\n   * CVE-url: https://ubuntu.com/security/CVE-2024-53214\n     - vfio/pci: Properly hide first-in-list PCIe extended capability\n   * CVE-url: https://ubuntu.com/security/CVE-2024-56700\n     - media: wl128x: Fix atomicity violation in fmc_send_cmd()\n   * CVE-url: https://ubuntu.com/security/CVE-2024-56531\n     - ALSA: caiaq: Use snd_card_free_when_closed() at disconnection\n   * CVE-url: https://ubuntu.com/security/CVE-2024-53194\n     - PCI: Fix use-after-free of slot->bus on hot remove\n   * CVE-url: https://ubuntu.com/security/CVE-2024-56619\n     - nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()\n   * CVE-url: https://ubuntu.com/security/CVE-2021-47636\n     - ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock()\n   * Bionic update: upstream stable patchset 2022-05-17 (LP: #1973831) // CVE-\n     url: https://ubuntu.com/security/CVE-2022-49058\n     - cifs: potential buffer overflow in handling symlinks\n   * CVE-url: https://ubuntu.com/security/CVE-2024-5317\n     - nfsd: make sure exp active before svc_export_show\n   * CVE-url: https://ubuntu.com/security/CVE-2024-53174\n     - SUNRPC: make sure cache entry active before cache_show\n   * CVE-url: https://ubuntu.com/security/CVE-2021-47219\n     - scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs()\n   * CVE-url: https://ubuntu.com/security/CVE-2024-50269\n     - usb: musb: sunxi: Fix accessing an released usb phy\n   * CVE-url: https://ubuntu.com/security/CVE-2024-57908\n     - iio: imu: kmx61: fix information leak in triggered buffer",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/ubuntu16.04els/advisories/2025/clsa-2025_1744713316.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2025:1744713316",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1744713316"
      }
    ],
    "tracking": {
      "current_release_date": "2025-05-19T15:19:21Z",
      "generator": {
        "date": "2025-05-19T15:19:21Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1744713316",
      "initial_release_date": "2025-04-15T10:35:18Z",
      "revision_history": [
        {
          "date": "2025-04-15T10:35:18Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-05-19T15:19:21Z",
          "number": "2",
          "summary": "Official Publication"
        }
      ],
      "status": "final",
      "version": "2"
    },
    "title": "Fix of 50 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Ubuntu 16.04",
                "product": {
                  "name": "Ubuntu 16.04",
                  "product_id": "Ubuntu-16",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Ubuntu"
          }
        ],
        "category": "vendor",
        "name": "Canonical Ltd."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "linux-headers-4.4.0-273-tuxcare.els44-lowlatency-0:4.4.0-273.307.amd64",
                "product": {
                  "name": "linux-headers-4.4.0-273-tuxcare.els44-lowlatency-0:4.4.0-273.307.amd64",
                  "product_id": "linux-headers-4.4.0-273-tuxcare.els44-lowlatency-0:4.4.0-273.307.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-headers-4.4.0-273-tuxcare.els44-lowlatency@4.4.0-273.307?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-libc-dev-0:4.4.0-273.307.amd64",
                "product": {
                  "name": "linux-libc-dev-0:4.4.0-273.307.amd64",
                  "product_id": "linux-libc-dev-0:4.4.0-273.307.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-libc-dev@4.4.0-273.307?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-generic-0:4.4.0.273.307.amd64",
                "product": {
                  "name": "linux-tools-generic-0:4.4.0.273.307.amd64",
                  "product_id": "linux-tools-generic-0:4.4.0.273.307.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-tools-generic@4.4.0.273.307?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-image-lowlatency-0:4.4.0.273.307.amd64",
                "product": {
                  "name": "linux-image-lowlatency-0:4.4.0.273.307.amd64",
                  "product_id": "linux-image-lowlatency-0:4.4.0.273.307.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-image-lowlatency@4.4.0.273.307?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
                "product": {
                  "name": "linux-tools-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
                  "product_id": "linux-tools-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-tools-4.4.0-273-tuxcare.els44-generic@4.4.0-273.307?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-cloud-tools-4.4.0-273-tuxcare.els44-0:4.4.0-273.307.amd64",
                "product": {
                  "name": "linux-cloud-tools-4.4.0-273-tuxcare.els44-0:4.4.0-273.307.amd64",
                  "product_id": "linux-cloud-tools-4.4.0-273-tuxcare.els44-0:4.4.0-273.307.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-cloud-tools-4.4.0-273-tuxcare.els44@4.4.0-273.307?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-lowlatency-0:4.4.0.273.307.amd64",
                "product": {
                  "name": "linux-lowlatency-0:4.4.0.273.307.amd64",
                  "product_id": "linux-lowlatency-0:4.4.0.273.307.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-lowlatency@4.4.0.273.307?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-headers-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
                "product": {
                  "name": "linux-headers-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
                  "product_id": "linux-headers-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-headers-4.4.0-273-tuxcare.els44-generic@4.4.0-273.307?arch=amd64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "linux-tools-host-0:4.4.0-273.307.all",
                "product": {
                  "name": "linux-tools-host-0:4.4.0-273.307.all",
                  "product_id": "linux-tools-host-0:4.4.0-273.307.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-tools-host@4.4.0-273.307?arch=all"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-source-4.4.0-0:4.4.0-273.307.all",
                "product": {
                  "name": "linux-source-4.4.0-0:4.4.0-273.307.all",
                  "product_id": "linux-source-4.4.0-0:4.4.0-273.307.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-source-4.4.0@4.4.0-273.307?arch=all"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "all"
          }
        ],
        "category": "vendor",
        "name": "CloudLinux"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-headers-4.4.0-273-tuxcare.els44-lowlatency-0:4.4.0-273.307.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-lowlatency-0:4.4.0-273.307.amd64"
        },
        "product_reference": "linux-headers-4.4.0-273-tuxcare.els44-lowlatency-0:4.4.0-273.307.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-libc-dev-0:4.4.0-273.307.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-libc-dev-0:4.4.0-273.307.amd64"
        },
        "product_reference": "linux-libc-dev-0:4.4.0-273.307.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-host-0:4.4.0-273.307.all as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-tools-host-0:4.4.0-273.307.all"
        },
        "product_reference": "linux-tools-host-0:4.4.0-273.307.all",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-generic-0:4.4.0.273.307.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-tools-generic-0:4.4.0.273.307.amd64"
        },
        "product_reference": "linux-tools-generic-0:4.4.0.273.307.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-source-4.4.0-0:4.4.0-273.307.all as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-source-4.4.0-0:4.4.0-273.307.all"
        },
        "product_reference": "linux-source-4.4.0-0:4.4.0-273.307.all",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-image-lowlatency-0:4.4.0.273.307.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-image-lowlatency-0:4.4.0.273.307.amd64"
        },
        "product_reference": "linux-image-lowlatency-0:4.4.0.273.307.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-tools-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64"
        },
        "product_reference": "linux-tools-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-cloud-tools-4.4.0-273-tuxcare.els44-0:4.4.0-273.307.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-cloud-tools-4.4.0-273-tuxcare.els44-0:4.4.0-273.307.amd64"
        },
        "product_reference": "linux-cloud-tools-4.4.0-273-tuxcare.els44-0:4.4.0-273.307.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-lowlatency-0:4.4.0.273.307.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-lowlatency-0:4.4.0.273.307.amd64"
        },
        "product_reference": "linux-lowlatency-0:4.4.0.273.307.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-headers-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64"
        },
        "product_reference": "linux-headers-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-47219",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs()\n\nThe following issue was observed running syzkaller:\n\nBUG: KASAN: slab-out-of-bounds in memcpy include/linux/string.h:377 [inline]\nBUG: KASAN: slab-out-of-bounds in sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831\nRead of size 2132 at addr ffff8880aea95dc8 by task syz-executor.0/9815\n\nCPU: 0 PID: 9815 Comm: syz-executor.0 Not tainted 4.19.202-00874-gfc0fe04215a9 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014\nCall Trace:\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0xe4/0x14a lib/dump_stack.c:118\n print_address_description+0x73/0x280 mm/kasan/report.c:253\n kasan_report_error mm/kasan/report.c:352 [inline]\n kasan_report+0x272/0x370 mm/kasan/report.c:410\n memcpy+0x1f/0x50 mm/kasan/kasan.c:302\n memcpy include/linux/string.h:377 [inline]\n sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831\n fill_from_dev_buffer+0x14f/0x340 drivers/scsi/scsi_debug.c:1021\n resp_report_tgtpgs+0x5aa/0x770 drivers/scsi/scsi_debug.c:1772\n schedule_resp+0x464/0x12f0 drivers/scsi/scsi_debug.c:4429\n scsi_debug_queuecommand+0x467/0x1390 drivers/scsi/scsi_debug.c:5835\n scsi_dispatch_cmd+0x3fc/0x9b0 drivers/scsi/scsi_lib.c:1896\n scsi_request_fn+0x1042/0x1810 drivers/scsi/scsi_lib.c:2034\n __blk_run_queue_uncond block/blk-core.c:464 [inline]\n __blk_run_queue+0x1a4/0x380 block/blk-core.c:484\n blk_execute_rq_nowait+0x1c2/0x2d0 block/blk-exec.c:78\n sg_common_write.isra.19+0xd74/0x1dc0 drivers/scsi/sg.c:847\n sg_write.part.23+0x6e0/0xd00 drivers/scsi/sg.c:716\n sg_write+0x64/0xa0 drivers/scsi/sg.c:622\n __vfs_write+0xed/0x690 fs/read_write.c:485\nkill_bdev:block_device:00000000e138492c\n vfs_write+0x184/0x4c0 fs/read_write.c:549\n ksys_write+0x107/0x240 fs/read_write.c:599\n do_syscall_64+0xc2/0x560 arch/x86/entry/common.c:293\n entry_SYSCALL_64_after_hwframe+0x49/0xbe\n\nWe get 'alen' from command its type is int. If userspace passes a large\nlength we will get a negative 'alen'.\n\nSwitch n, alen, and rlen to u32.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-lowlatency-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-tools-host-0:4.4.0-273.307.all",
          "Ubuntu-16:linux-tools-generic-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-273.307.all",
          "Ubuntu-16:linux-image-lowlatency-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-tools-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-273-tuxcare.els44-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-lowlatency-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-47219"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/66523553fa62c7878fc5441dc4e82be71934eb77",
          "url": "https://git.kernel.org/stable/c/66523553fa62c7878fc5441dc4e82be71934eb77"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8440377e1a5644779b4c8d013aa2a917f5fc83c3",
          "url": "https://git.kernel.org/stable/c/8440377e1a5644779b4c8d013aa2a917f5fc83c3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f347c26836c270199de1599c3cd466bb7747caa9",
          "url": "https://git.kernel.org/stable/c/f347c26836c270199de1599c3cd466bb7747caa9"
        }
      ],
      "release_date": "2024-04-10T19:15:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-lowlatency-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-tools-host-0:4.4.0-273.307.all",
            "Ubuntu-16:linux-tools-generic-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-273.307.all",
            "Ubuntu-16:linux-image-lowlatency-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-tools-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-273-tuxcare.els44-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-lowlatency-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2024-56531",
      "cwe": {
        "id": "CWE-459",
        "name": "Incomplete Cleanup"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nALSA: caiaq: Use snd_card_free_when_closed() at disconnection\nThe USB disconnect callback is supposed to be short and not too-long\nwaiting.  OTOH, the current code uses snd_card_free() at\ndisconnection, but this waits for the close of all used fds, hence it\ncan take long.  It eventually blocks the upper layer USB ioctls, which\nmay trigger a soft lockup.\nAn easy workaround is to replace snd_card_free() with\nsnd_card_free_when_closed().  This variant returns immediately while\nthe release of resources is done asynchronously by the card device\nrelease at the last close.\nThis patch also splits the code to the disconnect and the free phases;\nthe former is called immediately at the USB disconnect callback while\nthe latter is called from the card destructor.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-lowlatency-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-tools-host-0:4.4.0-273.307.all",
          "Ubuntu-16:linux-tools-generic-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-273.307.all",
          "Ubuntu-16:linux-image-lowlatency-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-tools-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-273-tuxcare.els44-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-lowlatency-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-56531"
        }
      ],
      "release_date": "2024-12-27T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-lowlatency-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-tools-host-0:4.4.0-273.307.all",
            "Ubuntu-16:linux-tools-generic-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-273.307.all",
            "Ubuntu-16:linux-image-lowlatency-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-tools-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-273-tuxcare.els44-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-lowlatency-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Medium"
        }
      ]
    },
    {
      "cve": "CVE-2024-49982",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\naoe: fix the potential use-after-free problem in more places\n\nFor fixing CVE-2023-6270, f98364e92662 (\"aoe: fix the potential\nuse-after-free problem in aoecmd_cfg_pkts\") makes tx() calling dev_put()\ninstead of doing in aoecmd_cfg_pkts(). It avoids that the tx() runs\ninto use-after-free.\n\nThen Nicolai Stange found more places in aoe have potential use-after-free\nproblem with tx(). e.g. revalidate(), aoecmd_ata_rw(), resend(), probe()\nand aoecmd_cfg_rsp(). Those functions also use aoenet_xmit() to push\npacket to tx queue. So they should also use dev_hold() to increase the\nrefcnt of skb->dev.\n\nOn the other hand, moving dev_put() to tx() causes that the refcnt of\nskb->dev be reduced to a negative value, because corresponding\ndev_hold() are not called in revalidate(), aoecmd_ata_rw(), resend(),\nprobe(), and aoecmd_cfg_rsp(). This patch fixed this issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-lowlatency-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-tools-host-0:4.4.0-273.307.all",
          "Ubuntu-16:linux-tools-generic-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-273.307.all",
          "Ubuntu-16:linux-image-lowlatency-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-tools-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-273-tuxcare.els44-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-lowlatency-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-49982"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/07b418d50ccbbca7e5d87a3a0d41d436cefebf79",
          "url": "https://git.kernel.org/stable/c/07b418d50ccbbca7e5d87a3a0d41d436cefebf79"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/12f7b89dd72b25da4eeaa22097877963cad6418e",
          "url": "https://git.kernel.org/stable/c/12f7b89dd72b25da4eeaa22097877963cad6418e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6d6e54fc71ad1ab0a87047fd9c211e75d86084a3",
          "url": "https://git.kernel.org/stable/c/6d6e54fc71ad1ab0a87047fd9c211e75d86084a3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8253a60c89ec35c8f36fb2cc08cdf854c7a3eb58",
          "url": "https://git.kernel.org/stable/c/8253a60c89ec35c8f36fb2cc08cdf854c7a3eb58"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/89d9a69ae0c667e4d9d028028e2dcc837bae626f",
          "url": "https://git.kernel.org/stable/c/89d9a69ae0c667e4d9d028028e2dcc837bae626f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a786265aecf39015418e4f930cc1c14603a01490",
          "url": "https://git.kernel.org/stable/c/a786265aecf39015418e4f930cc1c14603a01490"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/acc5103a0a8c200a52af7d732c36a8477436a3d3",
          "url": "https://git.kernel.org/stable/c/acc5103a0a8c200a52af7d732c36a8477436a3d3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bc2cbf7525ac288e07d465f5a1d8cb8fb9599254",
          "url": "https://git.kernel.org/stable/c/bc2cbf7525ac288e07d465f5a1d8cb8fb9599254"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f63461af2c1a86af4217910e47a5c46e3372e645",
          "url": "https://git.kernel.org/stable/c/f63461af2c1a86af4217910e47a5c46e3372e645"
        }
      ],
      "release_date": "2024-10-21T18:15:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-lowlatency-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-tools-host-0:4.4.0-273.307.all",
            "Ubuntu-16:linux-tools-generic-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-273.307.all",
            "Ubuntu-16:linux-image-lowlatency-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-tools-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-273-tuxcare.els44-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-lowlatency-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2021-47357",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\natm: iphase: fix possible use-after-free in ia_module_exit()\n\nThis module's remove path calls del_timer(). However, that function\ndoes not wait until the timer handler finishes. This means that the\ntimer handler may still be running after the driver's remove function\nhas finished, which would result in a use-after-free.\n\nFix by calling del_timer_sync(), which makes sure the timer handler\nhas finished, and unable to re-schedule itself.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-lowlatency-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-tools-host-0:4.4.0-273.307.all",
          "Ubuntu-16:linux-tools-generic-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-273.307.all",
          "Ubuntu-16:linux-image-lowlatency-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-tools-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-273-tuxcare.els44-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-lowlatency-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-47357"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1c72e6ab66b9598cac741ed397438a52065a8f1f",
          "url": "https://git.kernel.org/stable/c/1c72e6ab66b9598cac741ed397438a52065a8f1f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/89ce0b0747f319eb70f85bc820dcc43cebbd5417",
          "url": "https://git.kernel.org/stable/c/89ce0b0747f319eb70f85bc820dcc43cebbd5417"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9e161687855175334ca93c6c3ccb221731194479",
          "url": "https://git.kernel.org/stable/c/9e161687855175334ca93c6c3ccb221731194479"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a832ee2f2145f57443b2d565f8cb5490e8339f42",
          "url": "https://git.kernel.org/stable/c/a832ee2f2145f57443b2d565f8cb5490e8339f42"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b58d246a058ae88484758cd4ab27b3180fd5ecf8",
          "url": "https://git.kernel.org/stable/c/b58d246a058ae88484758cd4ab27b3180fd5ecf8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bcdd2be48edd8c6867fb44112cb8d18086beae29",
          "url": "https://git.kernel.org/stable/c/bcdd2be48edd8c6867fb44112cb8d18086beae29"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c9172498d4d62c9b64e5fb37c1ee0343e65fe51b",
          "url": "https://git.kernel.org/stable/c/c9172498d4d62c9b64e5fb37c1ee0343e65fe51b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d1fb12412874c94ad037e11d0ecdd1140a439297",
          "url": "https://git.kernel.org/stable/c/d1fb12412874c94ad037e11d0ecdd1140a439297"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e759ff76ebbbfcdcf83b6634c54dc47828573d8b",
          "url": "https://git.kernel.org/stable/c/e759ff76ebbbfcdcf83b6634c54dc47828573d8b"
        }
      ],
      "release_date": "2024-05-21T15:15:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-lowlatency-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-tools-host-0:4.4.0-273.307.all",
            "Ubuntu-16:linux-tools-generic-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-273.307.all",
            "Ubuntu-16:linux-image-lowlatency-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-tools-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-273-tuxcare.els44-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-lowlatency-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2024-5317",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
      },
      "notes": [
        {
          "category": "description",
          "text": "The Newsletter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'np1' parameter in all versions up to, and including, 8.3.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-lowlatency-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-tools-host-0:4.4.0-273.307.all",
          "Ubuntu-16:linux-tools-generic-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-273.307.all",
          "Ubuntu-16:linux-image-lowlatency-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-tools-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-273-tuxcare.els44-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-lowlatency-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-5317"
        },
        {
          "category": "external",
          "summary": "https://plugins.trac.wordpress.org/changeset/3095002/newsletter",
          "url": "https://plugins.trac.wordpress.org/changeset/3095002/newsletter"
        },
        {
          "category": "external",
          "summary": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4876e05e-efa6-46c6-832b-9ecc42934998?source=cve",
          "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4876e05e-efa6-46c6-832b-9ecc42934998?source=cve"
        }
      ],
      "release_date": "2024-06-05T02:15:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-lowlatency-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-tools-host-0:4.4.0-273.307.all",
            "Ubuntu-16:linux-tools-generic-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-273.307.all",
            "Ubuntu-16:linux-image-lowlatency-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-tools-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-273-tuxcare.els44-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-lowlatency-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Medium"
        }
      ]
    },
    {
      "cve": "CVE-2021-47110",
      "cwe": {
        "id": "CWE-459",
        "name": "Incomplete Cleanup"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/kvm: Disable kvmclock on all CPUs on shutdown\n\nCurrenly, we disable kvmclock from machine_shutdown() hook and this\nonly happens for boot CPU. We need to disable it for all CPUs to\nguard against memory corruption e.g. on restore from hibernate.\n\nNote, writing '0' to kvmclock MSR doesn't clear memory location, it\njust prevents hypervisor from updating the location so for the short\nwhile after write and while CPU is still alive, the clock remains usable\nand correct so we don't need to switch to some other clocksource.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-lowlatency-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-tools-host-0:4.4.0-273.307.all",
          "Ubuntu-16:linux-tools-generic-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-273.307.all",
          "Ubuntu-16:linux-image-lowlatency-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-tools-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-273-tuxcare.els44-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-lowlatency-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-47110"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1df2dc09926f61319116c80ee85701df33577d70",
          "url": "https://git.kernel.org/stable/c/1df2dc09926f61319116c80ee85701df33577d70"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3b0becf8b1ecf642a9edaf4c9628ffc641e490d6",
          "url": "https://git.kernel.org/stable/c/3b0becf8b1ecf642a9edaf4c9628ffc641e490d6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9084fe1b3572664ad276f427dce575f580c9799a",
          "url": "https://git.kernel.org/stable/c/9084fe1b3572664ad276f427dce575f580c9799a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c02027b5742b5aa804ef08a4a9db433295533046",
          "url": "https://git.kernel.org/stable/c/c02027b5742b5aa804ef08a4a9db433295533046"
        }
      ],
      "release_date": "2024-03-15T21:15:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-lowlatency-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-tools-host-0:4.4.0-273.307.all",
            "Ubuntu-16:linux-tools-generic-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-273.307.all",
            "Ubuntu-16:linux-image-lowlatency-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-tools-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-273-tuxcare.els44-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-lowlatency-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2024-26872",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/srpt: Do not register event handler until srpt device is fully setup\n\nUpon rare occasions, KASAN reports a use-after-free Write\nin srpt_refresh_port().\n\nThis seems to be because an event handler is registered before the\nsrpt device is fully setup and a race condition upon error may leave a\npartially setup event handler in place.\n\nInstead, only register the event handler after srpt device initialization\nis complete.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-lowlatency-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-tools-host-0:4.4.0-273.307.all",
          "Ubuntu-16:linux-tools-generic-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-273.307.all",
          "Ubuntu-16:linux-image-lowlatency-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-tools-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-273-tuxcare.els44-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-lowlatency-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-26872"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6413e78086caf7bf15639923740da0d91fdfd090",
          "url": "https://git.kernel.org/stable/c/6413e78086caf7bf15639923740da0d91fdfd090"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7104a00fa37ae898a827381f1161fa3286c8b346",
          "url": "https://git.kernel.org/stable/c/7104a00fa37ae898a827381f1161fa3286c8b346"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/85570b91e4820a0db9d9432098778cafafa7d217",
          "url": "https://git.kernel.org/stable/c/85570b91e4820a0db9d9432098778cafafa7d217"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bdd895e0190c464f54f84579e7535d80276f0fc5",
          "url": "https://git.kernel.org/stable/c/bdd895e0190c464f54f84579e7535d80276f0fc5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c21a8870c98611e8f892511825c9607f1e2cd456",
          "url": "https://git.kernel.org/stable/c/c21a8870c98611e8f892511825c9607f1e2cd456"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e362d007294955a4fb929e1c8978154a64efdcb6",
          "url": "https://git.kernel.org/stable/c/e362d007294955a4fb929e1c8978154a64efdcb6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ec77fa12da41260c6bf9e060b89234b980c5130f",
          "url": "https://git.kernel.org/stable/c/ec77fa12da41260c6bf9e060b89234b980c5130f"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"
        }
      ],
      "release_date": "2024-04-17T11:15:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-lowlatency-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-tools-host-0:4.4.0-273.307.all",
            "Ubuntu-16:linux-tools-generic-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-273.307.all",
            "Ubuntu-16:linux-image-lowlatency-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-tools-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-273-tuxcare.els44-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-lowlatency-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2024-26982",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: check the inode number is not the invalid value of zero\n\nSyskiller has produced an out of bounds access in fill_meta_index().\n\nThat out of bounds access is ultimately caused because the inode\nhas an inode number with the invalid value of zero, which was not checked.\n\nThe reason this causes the out of bounds access is due to following\nsequence of events:\n\n1. Fill_meta_index() is called to allocate (via empty_meta_index())\n   and fill a metadata index.  It however suffers a data read error\n   and aborts, invalidating the newly returned empty metadata index.\n   It does this by setting the inode number of the index to zero,\n   which means unused (zero is not a valid inode number).\n\n2. When fill_meta_index() is subsequently called again on another\n   read operation, locate_meta_index() returns the previous index\n   because it matches the inode number of 0.  Because this index\n   has been returned it is expected to have been filled, and because\n   it hasn't been, an out of bounds access is performed.\n\nThis patch adds a sanity check which checks that the inode number\nis not zero when the inode is created and returns -EINVAL if it is.\n\n[phillip@squashfs.org.uk: whitespace fix]",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-lowlatency-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-tools-host-0:4.4.0-273.307.all",
          "Ubuntu-16:linux-tools-generic-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-273.307.all",
          "Ubuntu-16:linux-image-lowlatency-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-tools-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-273-tuxcare.els44-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-lowlatency-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-26982"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/32c114a58236fe67141634774559f21f1dc96fd7",
          "url": "https://git.kernel.org/stable/c/32c114a58236fe67141634774559f21f1dc96fd7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4a1b6f89825e267e156ccaeba3d235edcac77f94",
          "url": "https://git.kernel.org/stable/c/4a1b6f89825e267e156ccaeba3d235edcac77f94"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5b99dea79650b50909c50aba24fbae00f203f013",
          "url": "https://git.kernel.org/stable/c/5b99dea79650b50909c50aba24fbae00f203f013"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7def00ebc9f2d6a581ddf46ce4541f84a10680e5",
          "url": "https://git.kernel.org/stable/c/7def00ebc9f2d6a581ddf46ce4541f84a10680e5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9253c54e01b6505d348afbc02abaa4d9f8a01395",
          "url": "https://git.kernel.org/stable/c/9253c54e01b6505d348afbc02abaa4d9f8a01395"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/be383effaee3d89034f0828038f95065b518772e",
          "url": "https://git.kernel.org/stable/c/be383effaee3d89034f0828038f95065b518772e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cf46f88b92cfc0e32bd8a21ba1273cff13b8745f",
          "url": "https://git.kernel.org/stable/c/cf46f88b92cfc0e32bd8a21ba1273cff13b8745f"
        }
      ],
      "release_date": "2024-05-01T06:15:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-lowlatency-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-tools-host-0:4.4.0-273.307.all",
            "Ubuntu-16:linux-tools-generic-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-273.307.all",
            "Ubuntu-16:linux-image-lowlatency-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-tools-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-273-tuxcare.els44-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-lowlatency-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2024-57980",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: uvcvideo: Fix double free in error path\n\nIf the uvc_status_init() function fails to allocate the int_urb, it will\nfree the dev->status pointer but doesn't reset the pointer to NULL. This\nresults in the kfree() call in uvc_status_cleanup() trying to\ndouble-free the memory. Fix it by resetting the dev->status pointer to\nNULL after freeing it.\n\nReviewed by: Ricardo Ribalda <ribalda@chromium.org>",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-lowlatency-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-tools-host-0:4.4.0-273.307.all",
          "Ubuntu-16:linux-tools-generic-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-273.307.all",
          "Ubuntu-16:linux-image-lowlatency-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-tools-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-273-tuxcare.els44-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-lowlatency-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-57980"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3ba8884a56a3eb97c22f0ce0e4dd410d4ca4c277",
          "url": "https://git.kernel.org/stable/c/3ba8884a56a3eb97c22f0ce0e4dd410d4ca4c277"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6c36dcd662ec5276782838660f8533a7cb26be49",
          "url": "https://git.kernel.org/stable/c/6c36dcd662ec5276782838660f8533a7cb26be49"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/87522ef165e5b6de8ef98cc318f3335166a1512c",
          "url": "https://git.kernel.org/stable/c/87522ef165e5b6de8ef98cc318f3335166a1512c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9232719ac9ce4d5c213cebda23d72aec3e1c4c0d",
          "url": "https://git.kernel.org/stable/c/9232719ac9ce4d5c213cebda23d72aec3e1c4c0d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c6ef3a7fa97ec823a1e1af9085cf13db9f7b3bac",
          "url": "https://git.kernel.org/stable/c/c6ef3a7fa97ec823a1e1af9085cf13db9f7b3bac"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d1f8e69eec91d5a75ef079778a5d0151db2a7f22",
          "url": "https://git.kernel.org/stable/c/d1f8e69eec91d5a75ef079778a5d0151db2a7f22"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d6e5ba2516c5bef87c1fcb8189b6f3cad7c64b2d",
          "url": "https://git.kernel.org/stable/c/d6e5ba2516c5bef87c1fcb8189b6f3cad7c64b2d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d8e63dd7b6683969d3d47c7b8e9635f96d554ad4",
          "url": "https://git.kernel.org/stable/c/d8e63dd7b6683969d3d47c7b8e9635f96d554ad4"
        }
      ],
      "release_date": "2025-02-27T02:15:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-lowlatency-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-tools-host-0:4.4.0-273.307.all",
            "Ubuntu-16:linux-tools-generic-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-273.307.all",
            "Ubuntu-16:linux-image-lowlatency-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-tools-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-273-tuxcare.els44-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-lowlatency-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2024-56594",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\ndrm/amdgpu: set the right AMDGPU sg segment limitation\nThe driver needs to set the correct max_segment_size;\notherwise debug_dma_map_sg() will complain about the\nover-mapping of the AMDGPU sg length as following:\nWARNING: CPU: 6 PID: 1964 at kernel/dma/debug.c:1178 debug_dma_map_sg+0x2dc/0x370\n[  364.049444] Modules linked in: veth amdgpu(OE) amdxcp drm_exec gpu_sched drm_buddy drm_ttm_helper ttm(OE) drm_suballoc_helper drm_display_helper drm_kms_helper i2c_algo_bit rpcsec_gss_krb5 auth_rpcgss nfsv4 nfs lockd grace netfs xt_conntrack xt_MASQUERADE nf_conntrack_netlink xfrm_user xfrm_algo iptable_nat xt_addrtype iptable_filter br_netfilter nvme_fabrics overlay nfnetlink_cttimeout nfnetlink openvswitch nsh nf_conncount nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c bridge stp llc amd_atl intel_rapl_msr intel_rapl_common sunrpc sch_fq_codel snd_hda_codec_realtek snd_hda_codec_generic snd_hda_scodec_component snd_hda_codec_hdmi snd_hda_intel snd_intel_dspcfg edac_mce_amd binfmt_misc snd_hda_codec snd_pci_acp6x snd_hda_core snd_acp_config snd_hwdep snd_soc_acpi kvm_amd snd_pcm kvm snd_seq_midi snd_seq_midi_event crct10dif_pclmul ghash_clmulni_intel sha512_ssse3 snd_rawmidi sha256_ssse3 sha1_ssse3 aesni_intel snd_seq nls_iso8859_1 crypto_simd snd_seq_device cryptd snd_timer rapl input_leds snd\n[  364.049532]  ipmi_devintf wmi_bmof ccp serio_raw k10temp sp5100_tco soundcore ipmi_msghandler cm32181 industrialio mac_hid msr parport_pc ppdev lp parport drm efi_pstore ip_tables x_tables pci_stub crc32_pclmul nvme ahci libahci i2c_piix4 r8169 nvme_core i2c_designware_pci realtek i2c_ccgx_ucsi video wmi hid_generic cdc_ether usbnet usbhid hid r8152 mii\n[  364.049576] CPU: 6 PID: 1964 Comm: rocminfo Tainted: G           OE      6.10.0-custom #492\n[  364.049579] Hardware name: AMD Majolica-RN/Majolica-RN, BIOS RMJ1009A 06/13/2021\n[  364.049582] RIP: 0010:debug_dma_map_sg+0x2dc/0x370\n[  364.049585] Code: 89 4d b8 e8 36 b1 86 00 8b 4d b8 48 8b 55 b0 44 8b 45 a8 4c 8b 4d a0 48 89 c6 48 c7 c7 00 4b 74 bc 4c 89 4d b8 e8 b4 73 f3 ff <0f> 0b 4c 8b 4d b8 8b 15 c8 2c b8 01 85 d2 0f 85 ee fd ff ff 8b 05\n[  364.049588] RSP: 0018:ffff9ca600b57ac0 EFLAGS: 00010286\n[  364.049590] RAX: 0000000000000000 RBX: ffff88b7c132b0c8 RCX: 0000000000000027\n[  364.049592] RDX: ffff88bb0f521688 RSI: 0000000000000001 RDI: ffff88bb0f521680\n[  364.049594] RBP: ffff9ca600b57b20 R08: 000000000000006f R09: ffff9ca600b57930\n[  364.049596] R10: ffff9ca600b57928 R11: ffffffffbcb46328 R12: 0000000000000000\n[  364.049597] R13: 0000000000000001 R14: ffff88b7c19c0700 R15: ffff88b7c9059800\n[  364.049599] FS:  00007fb2d3516e80(0000) GS:ffff88bb0f500000(0000) knlGS:0000000000000000\n[  364.049601] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  364.049603] CR2: 000055610bd03598 CR3: 00000001049f6000 CR4: 0000000000350ef0\n[  364.049605] Call Trace:\n[  364.049607]  <TASK>\n[  364.049609]  ? show_regs+0x6d/0x80\n[  364.049614]  ? __warn+0x8c/0x140\n[  364.049618]  ? debug_dma_map_sg+0x2dc/0x370\n[  364.049621]  ? report_bug+0x193/0x1a0\n[  364.049627]  ? handle_bug+0x46/0x80\n[  364.049631]  ? exc_invalid_op+0x1d/0x80\n[  364.049635]  ? asm_exc_invalid_op+0x1f/0x30\n[  364.049642]  ? debug_dma_map_sg+0x2dc/0x370\n[  364.049647]  __dma_map_sg_attrs+0x90/0xe0\n[  364.049651]  dma_map_sgtable+0x25/0x40\n[  364.049654]  amdgpu_bo_move+0x59a/0x850 [amdgpu]\n[  364.049935]  ? srso_return_thunk+0x5/0x5f\n[  364.049939]  ? amdgpu_ttm_tt_populate+0x5d/0xc0 [amdgpu]\n[  364.050095]  ttm_bo_handle_move_mem+0xc3/0x180 [ttm]\n[  364.050103]  ttm_bo_validate+0xc1/0x160 [ttm]\n[  364.050108]  ? amdgpu_ttm_tt_get_user_pages+0xe5/0x1b0 [amdgpu]\n[  364.050263]  amdgpu_amdkfd_gpuvm_alloc_memory_of_gpu+0xa12/0xc90 [amdgpu]\n[  364.050473]  kfd_ioctl_alloc_memory_of_gpu+0x16b/0x3b0 [amdgpu]\n[  364.050680]  kfd_ioctl+0x3c2/0x530 [amdgpu]\n[  364.050866]  ? __pfx_kfd_ioctl_alloc_memory_of_gpu+0x10/0x10 [amdgpu]\n[  364.05105\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-lowlatency-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-tools-host-0:4.4.0-273.307.all",
          "Ubuntu-16:linux-tools-generic-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-273.307.all",
          "Ubuntu-16:linux-image-lowlatency-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-tools-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-273-tuxcare.els44-0:4.4.0-273.307.amd64",
          "Ubuntu-16:linux-lowlatency-0:4.4.0.273.307.amd64",
          "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-56594"
        }
      ],
      "release_date": "2024-12-27T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-lowlatency-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-tools-host-0:4.4.0-273.307.all",
            "Ubuntu-16:linux-tools-generic-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-273.307.all",
            "Ubuntu-16:linux-image-lowlatency-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-tools-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-273-tuxcare.els44-0:4.4.0-273.307.amd64",
            "Ubuntu-16:linux-lowlatency-0:4.4.0.273.307.amd64",
            "Ubuntu-16:linux-headers-4.4.0-273-tuxcare.els44-generic-0:4.4.0-273.307.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Medium"
        }
      ]
    }
  ]
}