{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "* Focal update: v5.4.291 upstream stable release (LP: #2106002) //\n     CVE-2025-21772\n     - partitions: mac: fix handling of bogus partition table\n   * CVE-url: https://ubuntu.com/security/CVE-2025-22079\n     - ocfs2: validate l_tree_depth to avoid out-of-bounds access\n   * CVE-url: https://ubuntu.com/security/CVE-2024-58014\n     - wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy()\n   * CVE-url: https://ubuntu.com/security/CVE-2024-41042\n     - netfilter: nf_tables: prefer nft_chain_validate\n   * CVE-url: https://ubuntu.com/security/CVE-2024-46713\n     - perf/aux: Fix AUX buffer serialization\n   * CVE-url: https://ubuntu.com/security/CVE-2025-38352\n     - posix-cpu-timers: fix race between handle_posix_cpu_timers() and\n       posix_cpu_timer_del()\n   * CVE-url: https://ubuntu.com/security/CVE-2025-38477\n     - net/sched: sch_qfq: Fix race condition on qfq_aggregate\n   * Focal update: v5.4.262 upstream stable release (LP: #2049069) // CVE-url:\n     https://ubuntu.com/security/CVE-2023-52804\n     - fs/jfs: Add check for negative db_l2nbperpage\n     - fs/jfs: Add validity check for db_maxag and db_agpref\n   * Focal update: v5.4.251 upstream stable release (LP: #2034918) // CVE-url:\n     https://ubuntu.com/security/CVE-2023-52804\n     - jfs: jfs_dmap: Validate db_l2nbperpage while mounting\n   * Bionic update: upstream stable patchset 2023-02-06 (LP: #2006403) // CVE-\n     url: https://ubuntu.com/security/CVE-2023-52804\n     - fs: jfs: fix shift-out-of-bounds in dbAllocAG\n   * CVE-url: https://ubuntu.com/security/CVE-2022-25265\n     - x86/elf: Add table to document READ_IMPLIES_EXEC\n     - x86/elf: Split READ_IMPLIES_EXEC from executable PT_GNU_STACK\n     - x86/elf: Disable automatic READ_IMPLIES_EXEC on 64-bit\n   * Bionic update: upstream stable patchset 2021-06-11 (LP: #1931740) // CVE-\n     url: https://ubuntu.com/security/CVE-2021-47153\n     - i2c: i801: Don't generate an interrupt on bus reset\n   * Bionic update: upstream stable patchset 2022-03-04 (LP: #1963717) // CVE-\n     url: https://ubuntu.com/security/CVE-2022-48757\n     - net: fix information leakage in /proc/net/ptype\n   * Focal update: v5.4.279 upstream stable release (LP: #2073621) // CVE-url:\n     https://ubuntu.com/security/CVE-2024-37078\n     - nilfs2: fix potential kernel bug due to lack of writeback flag waiting\n   * Bionic update: upstream stable patchset 2022-03-04 (LP: #1963717) // CVE-\n     url: https://ubuntu.com/security/CVE-2022-48760\n     - USB: core: Fix hang in usb_kill_urb by adding memory barriers\n   * Bionic update: upstream stable patchset 2021-11-02 (LP: #1949512) // CVE-\n     url: https://ubuntu.com/security/CVE-2021-47383\n     - tty: Fix out-of-bound vmalloc access in imageblit\n   * Bionic update: upstream stable patchset 2022-05-17 (LP: #1973831) // CVE-\n     url: https://ubuntu.com/security/CVE-2022-49145\n     - ACPI: CPPC: Avoid out of bounds access when parsing _CPC data\n   * Bionic update: upstream stable patchset 2021-11-23 (LP: #1951997) // CVE-\n     url: https://ubuntu.com/security/CVE-2021-47458\n     - ocfs2: mount fails with buffer overflow in strlen\n   * CVE-url: https://ubuntu.com/security/CVE-2022-49170\n     - f2fs: fix to do sanity check on curseg->alloc_type\n   * CVE-url: https://ubuntu.com/security/CVE-2021-47479\n     - staging: rtl8712: fix use-after-free in rtl8712_dl_fw\n   * Bionic update: upstream stable patchset 2021-12-03 (LP: #1953202) // CVE-\n     url: https://ubuntu.com/security/CVE-2021-47477\n     - comedi: dt9812: fix DMA buffers on stack\n   * Bionic update: upstream stable patchset 2022-05-17 (LP: #1973831) // CVE-\n     url: https://ubuntu.com/security/CVE-2021-47642\n     - video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow\n   * Bionic update: upstream stable patchset 2022-01-06 (LP: #1956614) // CVE-\n     url: https://ubuntu.com/security/CVE-2021-47565\n     - scsi: mpt3sas: Fix kernel panic during drive powercycle test\n   * Bionic update: upstream stable patchset 2022-01-06 (LP: #1956614) // CVE-\n     url: https://ubuntu.com/security/CVE-2021-47566\n     - proc/vmcore: fix clearing user buffer by properly using clear_user()\n   * Focal update: v5.4.279 upstream stable release (LP: #2073621) // CVE-url:\n     https://ubuntu.com/security/CVE-2024-39469\n     - nilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors\n   * CVE-url: https://ubuntu.com/security/CVE-2022-49519\n     - ath10k: skip ath10k_halt during suspend for driver state RESTARTING\n   * CVE-url: https://ubuntu.com/security/CVE-2024-36880\n     - Bluetooth: qca: add missing firmware sanity checks\n   * Miscellaneous upstream changes\n     - net: openvswitch: fix nested key length validation in the set() action\n     - isofs: Prevent the use of too small fid\n     - net: ppp: Add bound checking for skb data on ppp_sync_txmung\n     - wifi: at76c50x: fix use after free access in at76_disconnect",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/ubuntu16.04els/advisories/2025/clsa-2025_1763991095.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2025:1763991095",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1763991095"
      }
    ],
    "tracking": {
      "current_release_date": "2025-11-24T13:35:27Z",
      "generator": {
        "date": "2025-11-24T13:35:27Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1763991095",
      "initial_release_date": "2025-11-24T13:35:27Z",
      "revision_history": [
        {
          "date": "2025-11-24T13:35:27Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "Fix of 25 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Ubuntu 16.04",
                "product": {
                  "name": "Ubuntu 16.04",
                  "product_id": "Ubuntu-16",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Ubuntu"
          }
        ],
        "category": "vendor",
        "name": "Canonical Ltd."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
                "product": {
                  "name": "linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
                  "product_id": "linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-image-unsigned-4.4.0-280-tuxcare.els51-generic@4.4.0-280.314?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-libc-dev-0:4.4.0-280.314.amd64",
                "product": {
                  "name": "linux-libc-dev-0:4.4.0-280.314.amd64",
                  "product_id": "linux-libc-dev-0:4.4.0-280.314.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-libc-dev@4.4.0-280.314?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
                "product": {
                  "name": "linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
                  "product_id": "linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-modules-4.4.0-280-tuxcare.els51-generic@4.4.0-280.314?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
                "product": {
                  "name": "linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
                  "product_id": "linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency@4.4.0-280.314?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
                "product": {
                  "name": "linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
                  "product_id": "linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-cloud-tools-4.4.0-280-tuxcare.els51-generic@4.4.0-280.314?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
                "product": {
                  "name": "linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
                  "product_id": "linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-tools-4.4.0-280-tuxcare.els51@4.4.0-280.314?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
                "product": {
                  "name": "linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
                  "product_id": "linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency@4.4.0-280.314?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
                "product": {
                  "name": "linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
                  "product_id": "linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-tools-4.4.0-280-tuxcare.els51-generic@4.4.0-280.314?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
                "product": {
                  "name": "linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
                  "product_id": "linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency@4.4.0-280.314?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
                "product": {
                  "name": "linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
                  "product_id": "linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-modules-extra-4.4.0-280-tuxcare.els51-generic@4.4.0-280.314?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
                "product": {
                  "name": "linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
                  "product_id": "linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-tools-4.4.0-280-tuxcare.els51-lowlatency@4.4.0-280.314?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
                "product": {
                  "name": "linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
                  "product_id": "linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-buildinfo-4.4.0-280-tuxcare.els51-generic@4.4.0-280.314?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
                "product": {
                  "name": "linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
                  "product_id": "linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-cloud-tools-4.4.0-280-tuxcare.els51@4.4.0-280.314?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
                "product": {
                  "name": "linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
                  "product_id": "linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-headers-4.4.0-280-tuxcare.els51-lowlatency@4.4.0-280.314?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
                "product": {
                  "name": "linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
                  "product_id": "linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-headers-4.4.0-280-tuxcare.els51-generic@4.4.0-280.314?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
                "product": {
                  "name": "linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
                  "product_id": "linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-modules-4.4.0-280-tuxcare.els51-lowlatency@4.4.0-280.314?arch=amd64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "linux-tools-host-0:4.4.0-280.314.all",
                "product": {
                  "name": "linux-tools-host-0:4.4.0-280.314.all",
                  "product_id": "linux-tools-host-0:4.4.0-280.314.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-tools-host@4.4.0-280.314?arch=all"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-source-4.4.0-0:4.4.0-280.314.all",
                "product": {
                  "name": "linux-source-4.4.0-0:4.4.0-280.314.all",
                  "product_id": "linux-source-4.4.0-0:4.4.0-280.314.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-source-4.4.0@4.4.0-280.314?arch=all"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-common-0:4.4.0-280.314.all",
                "product": {
                  "name": "linux-tools-common-0:4.4.0-280.314.all",
                  "product_id": "linux-tools-common-0:4.4.0-280.314.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-tools-common@4.4.0-280.314?arch=all"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-cloud-tools-common-0:4.4.0-280.314.all",
                "product": {
                  "name": "linux-cloud-tools-common-0:4.4.0-280.314.all",
                  "product_id": "linux-cloud-tools-common-0:4.4.0-280.314.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-cloud-tools-common@4.4.0-280.314?arch=all"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-doc-0:4.4.0-280.314.all",
                "product": {
                  "name": "linux-doc-0:4.4.0-280.314.all",
                  "product_id": "linux-doc-0:4.4.0-280.314.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-doc@4.4.0-280.314?arch=all"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
                "product": {
                  "name": "linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
                  "product_id": "linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-headers-4.4.0-280-tuxcare.els51@4.4.0-280.314?arch=all"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "all"
          }
        ],
        "category": "vendor",
        "name": "CloudLinux"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64"
        },
        "product_reference": "linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-libc-dev-0:4.4.0-280.314.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64"
        },
        "product_reference": "linux-libc-dev-0:4.4.0-280.314.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64"
        },
        "product_reference": "linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-host-0:4.4.0-280.314.all as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
        },
        "product_reference": "linux-tools-host-0:4.4.0-280.314.all",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-source-4.4.0-0:4.4.0-280.314.all as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all"
        },
        "product_reference": "linux-source-4.4.0-0:4.4.0-280.314.all",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64"
        },
        "product_reference": "linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64"
        },
        "product_reference": "linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64"
        },
        "product_reference": "linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64"
        },
        "product_reference": "linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64"
        },
        "product_reference": "linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64"
        },
        "product_reference": "linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64"
        },
        "product_reference": "linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64"
        },
        "product_reference": "linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64"
        },
        "product_reference": "linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-common-0:4.4.0-280.314.all as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all"
        },
        "product_reference": "linux-tools-common-0:4.4.0-280.314.all",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64"
        },
        "product_reference": "linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-cloud-tools-common-0:4.4.0-280.314.all as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all"
        },
        "product_reference": "linux-cloud-tools-common-0:4.4.0-280.314.all",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-doc-0:4.4.0-280.314.all as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-doc-0:4.4.0-280.314.all"
        },
        "product_reference": "linux-doc-0:4.4.0-280.314.all",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all"
        },
        "product_reference": "linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64"
        },
        "product_reference": "linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64"
        },
        "product_reference": "linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64 as a component of Ubuntu 16.04",
          "product_id": "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64"
        },
        "product_reference": "linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
        "relates_to_product_reference": "Ubuntu-16"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-48760",
      "cwe": {
        "id": "CWE-667",
        "name": "Improper Locking"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix hang in usb_kill_urb by adding memory barriers\n\nThe syzbot fuzzer has identified a bug in which processes hang waiting\nfor usb_kill_urb() to return.  It turns out the issue is not unlinking\nthe URB; that works just fine.  Rather, the problem arises when the\nwakeup notification that the URB has completed is not received.\n\nThe reason is memory-access ordering on SMP systems.  In outline form,\nusb_kill_urb() and __usb_hcd_giveback_urb() operating concurrently on\ndifferent CPUs perform the following actions:\n\nCPU 0\t\t\t\t\tCPU 1\n----------------------------\t\t---------------------------------\nusb_kill_urb():\t\t\t\t__usb_hcd_giveback_urb():\n  ...\t\t\t\t\t  ...\n  atomic_inc(&urb->reject);\t\t  atomic_dec(&urb->use_count);\n  ...\t\t\t\t\t  ...\n  wait_event(usb_kill_urb_queue,\n\tatomic_read(&urb->use_count) == 0);\n\t\t\t\t\t  if (atomic_read(&urb->reject))\n\t\t\t\t\t\twake_up(&usb_kill_urb_queue);\n\nConfining your attention to urb->reject and urb->use_count, you can\nsee that the overall pattern of accesses on CPU 0 is:\n\n\twrite urb->reject, then read urb->use_count;\n\nwhereas the overall pattern of accesses on CPU 1 is:\n\n\twrite urb->use_count, then read urb->reject.\n\nThis pattern is referred to in memory-model circles as SB (for \"Store\nBuffering\"), and it is well known that without suitable enforcement of\nthe desired order of accesses -- in the form of memory barriers -- it\nis entirely possible for one or both CPUs to execute their reads ahead\nof their writes.  The end result will be that sometimes CPU 0 sees the\nold un-decremented value of urb->use_count while CPU 1 sees the old\nun-incremented value of urb->reject.  Consequently CPU 0 ends up on\nthe wait queue and never gets woken up, leading to the observed hang\nin usb_kill_urb().\n\nThe same pattern of accesses occurs in usb_poison_urb() and the\nfailure pathway of usb_hcd_submit_urb().\n\nThe problem is fixed by adding suitable memory barriers.  To provide\nproper memory-access ordering in the SB pattern, a full barrier is\nrequired on both CPUs.  The atomic_inc() and atomic_dec() accesses\nthemselves don't provide any memory ordering, but since they are\npresent, we can use the optimized smp_mb__after_atomic() memory\nbarrier in the various routines to obtain the desired effect.\n\nThis patch adds the necessary memory barriers.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-48760"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/26fbe9772b8c459687930511444ce443011f86bf",
          "url": "https://git.kernel.org/stable/c/26fbe9772b8c459687930511444ce443011f86bf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/546ba238535d925254e0b3f12012a5c55801e2f3",
          "url": "https://git.kernel.org/stable/c/546ba238535d925254e0b3f12012a5c55801e2f3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5904dfd3ddaff3bf4a41c3baf0a8e8f31ed4599b",
          "url": "https://git.kernel.org/stable/c/5904dfd3ddaff3bf4a41c3baf0a8e8f31ed4599b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5f138ef224dffd15d5e5c5b095859719e0038427",
          "url": "https://git.kernel.org/stable/c/5f138ef224dffd15d5e5c5b095859719e0038427"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9340226388c66a7e090ebb00e91ed64a753b6c26",
          "url": "https://git.kernel.org/stable/c/9340226388c66a7e090ebb00e91ed64a753b6c26"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9c61fce322ac2ef7fecf025285353570d60e41d6",
          "url": "https://git.kernel.org/stable/c/9c61fce322ac2ef7fecf025285353570d60e41d6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b50f5ca60475710bbc9a3af32fbfc17b1e69c2f0",
          "url": "https://git.kernel.org/stable/c/b50f5ca60475710bbc9a3af32fbfc17b1e69c2f0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c9a18f7c5b071dce5e6939568829d40994866ab0",
          "url": "https://git.kernel.org/stable/c/c9a18f7c5b071dce5e6939568829d40994866ab0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e3b131e30e612ff0e32de6c1cb4f69f89db29193",
          "url": "https://git.kernel.org/stable/c/e3b131e30e612ff0e32de6c1cb4f69f89db29193"
        }
      ],
      "release_date": "2024-06-20T12:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-47566",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nproc/vmcore: fix clearing user buffer by properly using clear_user()\n\nTo clear a user buffer we cannot simply use memset, we have to use\nclear_user().  With a virtio-mem device that registers a vmcore_cb and\nhas some logically unplugged memory inside an added Linux memory block,\nI can easily trigger a BUG by copying the vmcore via \"cp\":\n\n  systemd[1]: Starting Kdump Vmcore Save Service...\n  kdump[420]: Kdump is using the default log level(3).\n  kdump[453]: saving to /sysroot/var/crash/127.0.0.1-2021-11-11-14:59:22/\n  kdump[458]: saving vmcore-dmesg.txt to /sysroot/var/crash/127.0.0.1-2021-11-11-14:59:22/\n  kdump[465]: saving vmcore-dmesg.txt complete\n  kdump[467]: saving vmcore\n  BUG: unable to handle page fault for address: 00007f2374e01000\n  #PF: supervisor write access in kernel mode\n  #PF: error_code(0x0003) - permissions violation\n  PGD 7a523067 P4D 7a523067 PUD 7a528067 PMD 7a525067 PTE 800000007048f867\n  Oops: 0003 [#1] PREEMPT SMP NOPTI\n  CPU: 0 PID: 468 Comm: cp Not tainted 5.15.0+ #6\n  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.14.0-27-g64f37cc530f1-prebuilt.qemu.org 04/01/2014\n  RIP: 0010:read_from_oldmem.part.0.cold+0x1d/0x86\n  Code: ff ff ff e8 05 ff fe ff e9 b9 e9 7f ff 48 89 de 48 c7 c7 38 3b 60 82 e8 f1 fe fe ff 83 fd 08 72 3c 49 8d 7d 08 4c 89 e9 89 e8 <49> c7 45 00 00 00 00 00 49 c7 44 05 f8 00 00 00 00 48 83 e7 f81\n  RSP: 0018:ffffc9000073be08 EFLAGS: 00010212\n  RAX: 0000000000001000 RBX: 00000000002fd000 RCX: 00007f2374e01000\n  RDX: 0000000000000001 RSI: 00000000ffffdfff RDI: 00007f2374e01008\n  RBP: 0000000000001000 R08: 0000000000000000 R09: ffffc9000073bc50\n  R10: ffffc9000073bc48 R11: ffffffff829461a8 R12: 000000000000f000\n  R13: 00007f2374e01000 R14: 0000000000000000 R15: ffff88807bd421e8\n  FS:  00007f2374e12140(0000) GS:ffff88807f000000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 00007f2374e01000 CR3: 000000007a4aa000 CR4: 0000000000350eb0\n  Call Trace:\n   read_vmcore+0x236/0x2c0\n   proc_reg_read+0x55/0xa0\n   vfs_read+0x95/0x190\n   ksys_read+0x4f/0xc0\n   do_syscall_64+0x3b/0x90\n   entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nSome x86-64 CPUs have a CPU feature called \"Supervisor Mode Access\nPrevention (SMAP)\", which is used to detect wrong access from the kernel\nto user buffers like this: SMAP triggers a permissions violation on\nwrong access.  In the x86-64 variant of clear_user(), SMAP is properly\nhandled via clac()+stac().\n\nTo fix, properly use clear_user() when we're dealing with a user buffer.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-47566"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/33a7d698f30fa0b99d50569e9909d3baa65d8f6a",
          "url": "https://git.kernel.org/stable/c/33a7d698f30fa0b99d50569e9909d3baa65d8f6a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7b3a34f08d11e7f05cd00b8e09adaa15192f0ad1",
          "url": "https://git.kernel.org/stable/c/7b3a34f08d11e7f05cd00b8e09adaa15192f0ad1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/99d348b82bcb36171f24411d3f1a15706a2a937a",
          "url": "https://git.kernel.org/stable/c/99d348b82bcb36171f24411d3f1a15706a2a937a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9ef384ed300d1bcfb23d0ab0b487d544444d4b52",
          "url": "https://git.kernel.org/stable/c/9ef384ed300d1bcfb23d0ab0b487d544444d4b52"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a8a917058faf4abaec9fb614bb6d5f8fe3529ec6",
          "url": "https://git.kernel.org/stable/c/a8a917058faf4abaec9fb614bb6d5f8fe3529ec6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a9e164bd160be8cbee1df70acb379129e3cd2e7c",
          "url": "https://git.kernel.org/stable/c/a9e164bd160be8cbee1df70acb379129e3cd2e7c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c1e63117711977cc4295b2ce73de29dd17066c82",
          "url": "https://git.kernel.org/stable/c/c1e63117711977cc4295b2ce73de29dd17066c82"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fd7974c547abfb03072a4ee706d3a6f182266f89",
          "url": "https://git.kernel.org/stable/c/fd7974c547abfb03072a4ee706d3a6f182266f89"
        }
      ],
      "release_date": "2024-05-24T15:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-41042",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: prefer nft_chain_validate\n\nnft_chain_validate already performs loop detection because a cycle will\nresult in a call stack overflow (ctx->level >= NFT_JUMP_STACK_SIZE).\n\nIt also follows maps via ->validate callback in nft_lookup, so there\nappears no reason to iterate the maps again.\n\nnf_tables_check_loops() and all its helper functions can be removed.\nThis improves ruleset load time significantly, from 23s down to 12s.\n\nThis also fixes a crash bug. Old loop detection code can result in\nunbounded recursion:\n\nBUG: TASK stack guard page was hit at ....\nOops: stack guard page: 0000 [#1] PREEMPT SMP KASAN\nCPU: 4 PID: 1539 Comm: nft Not tainted 6.10.0-rc5+ #1\n[..]\n\nwith a suitable ruleset during validation of register stores.\n\nI can't see any actual reason to attempt to check for this from\nnft_validate_register_store(), at this point the transaction is still in\nprogress, so we don't have a full picture of the rule graph.\n\nFor nf-next it might make sense to either remove it or make this depend\non table->validate_state in case we could catch an error earlier\n(for improved error reporting to userspace).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-41042"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1947e4c3346faa8ac7e343652c0fd3b3e394202f",
          "url": "https://git.kernel.org/stable/c/1947e4c3346faa8ac7e343652c0fd3b3e394202f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/31c35f9f89ef585f1edb53e17ac73a0ca4a9712b",
          "url": "https://git.kernel.org/stable/c/31c35f9f89ef585f1edb53e17ac73a0ca4a9712b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/717c91c6ed73e248de6a15bc53adefb81446c9d0",
          "url": "https://git.kernel.org/stable/c/717c91c6ed73e248de6a15bc53adefb81446c9d0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8246b7466c8da49d0d9e85e26cbd69dd6d3e3d1e",
          "url": "https://git.kernel.org/stable/c/8246b7466c8da49d0d9e85e26cbd69dd6d3e3d1e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9df785aeb7dcc8efd1d4110bb27d26005298ebae",
          "url": "https://git.kernel.org/stable/c/9df785aeb7dcc8efd1d4110bb27d26005298ebae"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b6b6e430470e1c3c5513311cb35a15a205595abe",
          "url": "https://git.kernel.org/stable/c/b6b6e430470e1c3c5513311cb35a15a205595abe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cd4348e0a50286282c314ad6d2b0740e7c812c24",
          "url": "https://git.kernel.org/stable/c/cd4348e0a50286282c314ad6d2b0740e7c812c24"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cff3bd012a9512ac5ed858d38e6ed65f6391008c",
          "url": "https://git.kernel.org/stable/c/cff3bd012a9512ac5ed858d38e6ed65f6391008c"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
        }
      ],
      "release_date": "2024-07-29T15:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2023-52804",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/jfs: Add validity check for db_maxag and db_agpref\n\nBoth db_maxag and db_agpref are used as the index of the\ndb_agfree array, but there is currently no validity check for\ndb_maxag and db_agpref, which can lead to errors.\n\nThe following is related bug reported by Syzbot:\n\nUBSAN: array-index-out-of-bounds in fs/jfs/jfs_dmap.c:639:20\nindex 7936 is out of range for type 'atomic_t[128]'\n\nAdd checking that the values of db_maxag and db_agpref are valid\nindexes for the db_agfree array.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-52804"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1f74d336990f37703a8eee77153463d65b67f70e",
          "url": "https://git.kernel.org/stable/c/1f74d336990f37703a8eee77153463d65b67f70e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2323de34a3ae61a9f9b544c18583f71cea86721f",
          "url": "https://git.kernel.org/stable/c/2323de34a3ae61a9f9b544c18583f71cea86721f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/32bd8f1cbcf8b663e29dd1f908ba3a129541a11b",
          "url": "https://git.kernel.org/stable/c/32bd8f1cbcf8b663e29dd1f908ba3a129541a11b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5013f8269887642cca784adc8db9b5f0b771533f",
          "url": "https://git.kernel.org/stable/c/5013f8269887642cca784adc8db9b5f0b771533f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/64933ab7b04881c6c18b21ff206c12278341c72e",
          "url": "https://git.kernel.org/stable/c/64933ab7b04881c6c18b21ff206c12278341c72e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a0649e2dd4a3595b5595a29d0064d047c2fae2fb",
          "url": "https://git.kernel.org/stable/c/a0649e2dd4a3595b5595a29d0064d047c2fae2fb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c6c8863fb3f57700ab583d875adda04caaf2278a",
          "url": "https://git.kernel.org/stable/c/c6c8863fb3f57700ab583d875adda04caaf2278a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ce15b0f1a431168f07b1cc6c9f71206a2db5c809",
          "url": "https://git.kernel.org/stable/c/ce15b0f1a431168f07b1cc6c9f71206a2db5c809"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dca403bb035a565bb98ecc1dda5d30f676feda40",
          "url": "https://git.kernel.org/stable/c/dca403bb035a565bb98ecc1dda5d30f676feda40"
        }
      ],
      "release_date": "2024-05-21T16:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-48757",
      "cwe": {
        "id": "CWE-668",
        "name": "Exposure of Resource to Wrong Sphere"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix information leakage in /proc/net/ptype\n\nIn one net namespace, after creating a packet socket without binding\nit to a device, users in other net namespaces can observe the new\n`packet_type` added by this packet socket by reading `/proc/net/ptype`\nfile. This is minor information leakage as packet socket is\nnamespace aware.\n\nAdd a net pointer in `packet_type` to keep the net namespace of\nof corresponding packet socket. In `ptype_seq_show`, this net pointer\nmust be checked when it is not NULL.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-48757"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/47934e06b65637c88a762d9c98329ae6e3238888",
          "url": "https://git.kernel.org/stable/c/47934e06b65637c88a762d9c98329ae6e3238888"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/839ec7039513a4f84bfbaff953a9393471176bee",
          "url": "https://git.kernel.org/stable/c/839ec7039513a4f84bfbaff953a9393471176bee"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8f88c78d24f6f346919007cd459fd7e51a8c7779",
          "url": "https://git.kernel.org/stable/c/8f88c78d24f6f346919007cd459fd7e51a8c7779"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b67ad6170c0ea87391bb253f35d1f78857736e54",
          "url": "https://git.kernel.org/stable/c/b67ad6170c0ea87391bb253f35d1f78857736e54"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/be1ca30331c7923c6f376610c1bd6059be9b1908",
          "url": "https://git.kernel.org/stable/c/be1ca30331c7923c6f376610c1bd6059be9b1908"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c38023032a598ec6263e008d62c7f02def72d5c7",
          "url": "https://git.kernel.org/stable/c/c38023032a598ec6263e008d62c7f02def72d5c7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/db044d97460ea792110eb8b971e82569ded536c6",
          "url": "https://git.kernel.org/stable/c/db044d97460ea792110eb8b971e82569ded536c6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e372ecd455b6ebc7720f52bf4b5f5d44d02f2092",
          "url": "https://git.kernel.org/stable/c/e372ecd455b6ebc7720f52bf4b5f5d44d02f2092"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e43669c77cb3a742b7d84ecdc7c68c4167a7709b",
          "url": "https://git.kernel.org/stable/c/e43669c77cb3a742b7d84ecdc7c68c4167a7709b"
        }
      ],
      "release_date": "2024-06-20T12:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-47153",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: i801: Don't generate an interrupt on bus reset\n\nNow that the i2c-i801 driver supports interrupts, setting the KILL bit\nin a attempt to recover from a timed out transaction triggers an\ninterrupt. Unfortunately, the interrupt handler (i801_isr) is not\nprepared for this situation and will try to process the interrupt as\nif it was signaling the end of a successful transaction. In the case\nof a block transaction, this can result in an out-of-range memory\naccess.\n\nThis condition was reproduced several times by syzbot:\nhttps://syzkaller.appspot.com/bug?extid=ed71512d469895b5b34e\nhttps://syzkaller.appspot.com/bug?extid=8c8dedc0ba9e03f6c79e\nhttps://syzkaller.appspot.com/bug?extid=c8ff0b6d6c73d81b610e\nhttps://syzkaller.appspot.com/bug?extid=33f6c360821c399d69eb\nhttps://syzkaller.appspot.com/bug?extid=be15dc0b1933f04b043a\nhttps://syzkaller.appspot.com/bug?extid=b4d3fd1dfd53e90afd79\n\nSo disable interrupts while trying to reset the bus. Interrupts will\nbe enabled again for the following transaction.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-47153"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/04cc05e3716ae31b17ecdab7bc55c8170def1b8b",
          "url": "https://git.kernel.org/stable/c/04cc05e3716ae31b17ecdab7bc55c8170def1b8b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/09c9e79f4c10cfb6b9e0e1b4dd355232e4b5a3b3",
          "url": "https://git.kernel.org/stable/c/09c9e79f4c10cfb6b9e0e1b4dd355232e4b5a3b3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1f583d3813f204449037cd2acbfc09168171362a",
          "url": "https://git.kernel.org/stable/c/1f583d3813f204449037cd2acbfc09168171362a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b523feb7e8e44652f92f3babb953a976e7ccbbef",
          "url": "https://git.kernel.org/stable/c/b523feb7e8e44652f92f3babb953a976e7ccbbef"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c70e1ba2e7e65255a0ce004f531dd90dada97a8c",
          "url": "https://git.kernel.org/stable/c/c70e1ba2e7e65255a0ce004f531dd90dada97a8c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dfa8929e117b0228a7765f5c3f5988a4a028f3c6",
          "url": "https://git.kernel.org/stable/c/dfa8929e117b0228a7765f5c3f5988a4a028f3c6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e4d8716c3dcec47f1557024add24e1f3c09eb24b",
          "url": "https://git.kernel.org/stable/c/e4d8716c3dcec47f1557024add24e1f3c09eb24b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f9469082126cebb7337db3992d143f5e4edfe629",
          "url": "https://git.kernel.org/stable/c/f9469082126cebb7337db3992d143f5e4edfe629"
        }
      ],
      "release_date": "2024-03-25T09:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-39469",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix nilfs_empty_dir() misjudgment and long loop on I/O errors\n\nThe error handling in nilfs_empty_dir() when a directory folio/page read\nfails is incorrect, as in the old ext2 implementation, and if the\nfolio/page cannot be read or nilfs_check_folio() fails, it will falsely\ndetermine the directory as empty and corrupt the file system.\n\nIn addition, since nilfs_empty_dir() does not immediately return on a\nfailed folio/page read, but continues to loop, this can cause a long loop\nwith I/O if i_size of the directory's inode is also corrupted, causing the\nlog writer thread to wait and hang, as reported by syzbot.\n\nFix these issues by making nilfs_empty_dir() immediately return a false\nvalue (0) if it fails to get a directory folio/page.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-39469"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/11a2edb70356a2202dcb7c9c189c8356ab4752cd",
          "url": "https://git.kernel.org/stable/c/11a2edb70356a2202dcb7c9c189c8356ab4752cd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/129dcd3e7d036218db3f59c82d82004b9539ed82",
          "url": "https://git.kernel.org/stable/c/129dcd3e7d036218db3f59c82d82004b9539ed82"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2ac8a2fe22bdde9eecce2a42cf5cab79333fb428",
          "url": "https://git.kernel.org/stable/c/2ac8a2fe22bdde9eecce2a42cf5cab79333fb428"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/405b71f1251e5ae865f53bd27c45114e6c83bee3",
          "url": "https://git.kernel.org/stable/c/405b71f1251e5ae865f53bd27c45114e6c83bee3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/59f14875a96ef93f05b82ad3c980605f2cb444b5",
          "url": "https://git.kernel.org/stable/c/59f14875a96ef93f05b82ad3c980605f2cb444b5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7373a51e7998b508af7136530f3a997b286ce81c",
          "url": "https://git.kernel.org/stable/c/7373a51e7998b508af7136530f3a997b286ce81c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c77ad608df6c091fe64ecb91f41ef7cb465587f1",
          "url": "https://git.kernel.org/stable/c/c77ad608df6c091fe64ecb91f41ef7cb465587f1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d18b05eda7fa77f02114f15b02c009f28ee42346",
          "url": "https://git.kernel.org/stable/c/d18b05eda7fa77f02114f15b02c009f28ee42346"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
        }
      ],
      "release_date": "2024-06-25T15:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-25265",
      "cwe": {
        "id": "CWE-913",
        "name": "Improper Control of Dynamically-Managed Code Resources"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel through 5.16.10, certain binary files may have the exec-all attribute if they were built in approximately 2003 (e.g., with GCC 3.2.2 and Linux kernel 2.4.20). This can cause execution of bytes located in supposedly non-executable regions of a file.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-25265"
        },
        {
          "category": "external",
          "summary": "https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294",
          "url": "https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294"
        },
        {
          "category": "external",
          "summary": "https://github.com/x0reaxeax/exec-prot-bypass",
          "url": "https://github.com/x0reaxeax/exec-prot-bypass"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20220318-0005/",
          "url": "https://security.netapp.com/advisory/ntap-20220318-0005/"
        }
      ],
      "release_date": "2022-02-16T21:15:00Z",
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49170",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to do sanity check on curseg->alloc_type\n\nAs Wenqing Liu reported in bugzilla:\n\nhttps://bugzilla.kernel.org/show_bug.cgi?id=215657\n\n- Overview\nUBSAN: array-index-out-of-bounds in fs/f2fs/segment.c:3460:2 when mount and operate a corrupted image\n\n- Reproduce\ntested on kernel 5.17-rc4, 5.17-rc6\n\n1. mkdir test_crash\n2. cd test_crash\n3. unzip tmp2.zip\n4. mkdir mnt\n5. ./single_test.sh f2fs 2\n\n- Kernel dump\n[   46.434454] loop0: detected capacity change from 0 to 131072\n[   46.529839] F2FS-fs (loop0): Mounted with checkpoint version = 7548c2d9\n[   46.738319] ================================================================================\n[   46.738412] UBSAN: array-index-out-of-bounds in fs/f2fs/segment.c:3460:2\n[   46.738475] index 231 is out of range for type 'unsigned int [2]'\n[   46.738539] CPU: 2 PID: 939 Comm: umount Not tainted 5.17.0-rc6 #1\n[   46.738547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.13.0-1ubuntu1.1 04/01/2014\n[   46.738551] Call Trace:\n[   46.738556]  <TASK>\n[   46.738563]  dump_stack_lvl+0x47/0x5c\n[   46.738581]  ubsan_epilogue+0x5/0x50\n[   46.738592]  __ubsan_handle_out_of_bounds+0x68/0x80\n[   46.738604]  f2fs_allocate_data_block+0xdff/0xe60 [f2fs]\n[   46.738819]  do_write_page+0xef/0x210 [f2fs]\n[   46.738934]  f2fs_do_write_node_page+0x3f/0x80 [f2fs]\n[   46.739038]  __write_node_page+0x2b7/0x920 [f2fs]\n[   46.739162]  f2fs_sync_node_pages+0x943/0xb00 [f2fs]\n[   46.739293]  f2fs_write_checkpoint+0x7bb/0x1030 [f2fs]\n[   46.739405]  kill_f2fs_super+0x125/0x150 [f2fs]\n[   46.739507]  deactivate_locked_super+0x60/0xc0\n[   46.739517]  deactivate_super+0x70/0xb0\n[   46.739524]  cleanup_mnt+0x11a/0x200\n[   46.739532]  __cleanup_mnt+0x16/0x20\n[   46.739538]  task_work_run+0x67/0xa0\n[   46.739547]  exit_to_user_mode_prepare+0x18c/0x1a0\n[   46.739559]  syscall_exit_to_user_mode+0x26/0x40\n[   46.739568]  do_syscall_64+0x46/0xb0\n[   46.739584]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nThe root cause is we missed to do sanity check on curseg->alloc_type,\nresult in out-of-bound accessing on sbi->block_count[] array, fix it.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49170"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0748a0f7dcb9d9dddc80302d73ebcecef6782ef0",
          "url": "https://git.kernel.org/stable/c/0748a0f7dcb9d9dddc80302d73ebcecef6782ef0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/498b7088db71f9707359448cd6800bbb1882f4c3",
          "url": "https://git.kernel.org/stable/c/498b7088db71f9707359448cd6800bbb1882f4c3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c12765e3f129b144421c80d3383df885f85ee290",
          "url": "https://git.kernel.org/stable/c/c12765e3f129b144421c80d3383df885f85ee290"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f41ee8b91c00770d718be2ff4852a80017ae9ab3",
          "url": "https://git.kernel.org/stable/c/f41ee8b91c00770d718be2ff4852a80017ae9ab3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f68caedf264a95c0b02dfd0d9f92ac2637d5848a",
          "url": "https://git.kernel.org/stable/c/f68caedf264a95c0b02dfd0d9f92ac2637d5848a"
        }
      ],
      "release_date": "2025-02-26T07:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38477",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nnet/sched: sch_qfq: Fix race condition on qfq_aggregate\nA race condition can occur when 'agg' is modified in qfq_change_agg\n(called during qfq_enqueue) while other threads access it\nconcurrently. For example, qfq_dump_class may trigger a NULL\ndereference, and qfq_delete_class may cause a use-after-free.\nThis patch addresses the issue by:\n1. Moved qfq_destroy_class into the critical section.\n2. Added sch_tree_lock protection to qfq_dump_class and\nqfq_dump_class_stats.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38477"
        }
      ],
      "release_date": "2025-07-28T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-47565",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpt3sas: Fix kernel panic during drive powercycle test\n\nWhile looping over shost's sdev list it is possible that one\nof the drives is getting removed and its sas_target object is\nfreed but its sdev object remains intact.\n\nConsequently, a kernel panic can occur while the driver is trying to access\nthe sas_address field of sas_target object without also checking the\nsas_target object for NULL.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-47565"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0d4b29eaadc1f59cec0c7e85eae77d08fcca9824",
          "url": "https://git.kernel.org/stable/c/0d4b29eaadc1f59cec0c7e85eae77d08fcca9824"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0ee4ba13e09c9d9c1cb6abb59da8295d9952328b",
          "url": "https://git.kernel.org/stable/c/0ee4ba13e09c9d9c1cb6abb59da8295d9952328b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2bf9c5a5039c8f4b037236aed505e6a25c1d5f7b",
          "url": "https://git.kernel.org/stable/c/2bf9c5a5039c8f4b037236aed505e6a25c1d5f7b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/58ef2c7a6de13721865d84b80eecf56d6cba0937",
          "url": "https://git.kernel.org/stable/c/58ef2c7a6de13721865d84b80eecf56d6cba0937"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5d4d50b1f159a5ebab7617f47121b4370aa58afe",
          "url": "https://git.kernel.org/stable/c/5d4d50b1f159a5ebab7617f47121b4370aa58afe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7e324f734a914957b8cc3ff4b4c9f0409558adb5",
          "url": "https://git.kernel.org/stable/c/7e324f734a914957b8cc3ff4b4c9f0409558adb5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8485649a7655e791a6e4e9f15b4d30fdae937184",
          "url": "https://git.kernel.org/stable/c/8485649a7655e791a6e4e9f15b4d30fdae937184"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/dd035ca0e7a142870a970d46b1d19276cfe2bc8c",
          "url": "https://git.kernel.org/stable/c/dd035ca0e7a142870a970d46b1d19276cfe2bc8c"
        }
      ],
      "release_date": "2024-05-24T15:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-47642",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow\n\nCoverity complains of a possible buffer overflow. However,\ngiven the 'static' scope of nvidia_setup_i2c_bus() it looks\nlike that can't happen after examiniing the call sites.\n\nCID 19036 (#1 of 1): Copy into fixed size buffer (STRING_OVERFLOW)\n1. fixed_size_dest: You might overrun the 48-character fixed-size string\n  chan->adapter.name by copying name without checking the length.\n2. parameter_as_source: Note: This defect has an elevated risk because the\n  source argument is a parameter of the current function.\n 89        strcpy(chan->adapter.name, name);\n\nFix this warning by using strscpy() which will silence the warning and\nprevent any future buffer overflows should the names used to identify the\nchannel become much longer.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-47642"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/055cdd2e7b992921424d4daaa285ced787fb205f",
          "url": "https://git.kernel.org/stable/c/055cdd2e7b992921424d4daaa285ced787fb205f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/08dff482012758935c185532b1ad7d584785a86e",
          "url": "https://git.kernel.org/stable/c/08dff482012758935c185532b1ad7d584785a86e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/37a1a2e6eeeb101285cd34e12e48a881524701aa",
          "url": "https://git.kernel.org/stable/c/37a1a2e6eeeb101285cd34e12e48a881524701aa"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/41baa86b6c802cdc6ab8ff2d46c083c9be93de81",
          "url": "https://git.kernel.org/stable/c/41baa86b6c802cdc6ab8ff2d46c083c9be93de81"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/47e5533adf118afaf06d25a3e2aaaab89371b1c5",
          "url": "https://git.kernel.org/stable/c/47e5533adf118afaf06d25a3e2aaaab89371b1c5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/580e5d3815474b8349250c25c16416585a72c7fe",
          "url": "https://git.kernel.org/stable/c/580e5d3815474b8349250c25c16416585a72c7fe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6a5226e544ac043bb2d8dc1bfe8920d02282f7cd",
          "url": "https://git.kernel.org/stable/c/6a5226e544ac043bb2d8dc1bfe8920d02282f7cd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/72dd5c46a152136712a55bf026a9aa8c1b12b60d",
          "url": "https://git.kernel.org/stable/c/72dd5c46a152136712a55bf026a9aa8c1b12b60d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9ff2f7294ab0f011cd4d1b7dcd9a07d8fdf72834",
          "url": "https://git.kernel.org/stable/c/9ff2f7294ab0f011cd4d1b7dcd9a07d8fdf72834"
        }
      ],
      "release_date": "2025-02-26T06:37:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-47477",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: dt9812: fix DMA buffers on stack\n\nUSB transfer buffers are typically mapped for DMA and must not be\nallocated on the stack or transfers will fail.\n\nAllocate proper transfer buffers in the various command helpers and\nreturn an error on short transfers instead of acting on random stack\ndata.\n\nNote that this also fixes a stack info leak on systems where DMA is not\nused as 32 bytes are always sent to the device regardless of how short\nthe command is.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-47477"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/20cebb8b620dc987e55ddc46801de986e081757e",
          "url": "https://git.kernel.org/stable/c/20cebb8b620dc987e55ddc46801de986e081757e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/365a346cda82f51d835c49136a00a9df8a78c7f2",
          "url": "https://git.kernel.org/stable/c/365a346cda82f51d835c49136a00a9df8a78c7f2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/39ea61037ae78f14fa121228dd962ea3280eacf3",
          "url": "https://git.kernel.org/stable/c/39ea61037ae78f14fa121228dd962ea3280eacf3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3ac273d154d634e2034508a14db82a95d7ad12ed",
          "url": "https://git.kernel.org/stable/c/3ac273d154d634e2034508a14db82a95d7ad12ed"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3efb7af8ac437085b6c776e5b54830b149d86efe",
          "url": "https://git.kernel.org/stable/c/3efb7af8ac437085b6c776e5b54830b149d86efe"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/536de747bc48262225889a533db6650731ab25d3",
          "url": "https://git.kernel.org/stable/c/536de747bc48262225889a533db6650731ab25d3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/786f5b03450454557ff858a8bead5d7c0cbf78d6",
          "url": "https://git.kernel.org/stable/c/786f5b03450454557ff858a8bead5d7c0cbf78d6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8a52bc480992c7c9da3ebfea456af731f50a4b97",
          "url": "https://git.kernel.org/stable/c/8a52bc480992c7c9da3ebfea456af731f50a4b97"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a6af69768d5cb4b2528946d53be5fa19ade37723",
          "url": "https://git.kernel.org/stable/c/a6af69768d5cb4b2528946d53be5fa19ade37723"
        }
      ],
      "release_date": "2024-05-22T09:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-47479",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: rtl8712: fix use-after-free in rtl8712_dl_fw\n\nSyzbot reported use-after-free in rtl8712_dl_fw(). The problem was in\nrace condition between r871xu_dev_remove() ->ndo_open() callback.\n\nIt's easy to see from crash log, that driver accesses released firmware\nin ->ndo_open() callback. It may happen, since driver was releasing\nfirmware _before_ unregistering netdev. Fix it by moving\nunregister_netdev() before cleaning up resources.\n\nCall Trace:\n...\n rtl871x_open_fw drivers/staging/rtl8712/hal_init.c:83 [inline]\n rtl8712_dl_fw+0xd95/0xe10 drivers/staging/rtl8712/hal_init.c:170\n rtl8712_hal_init drivers/staging/rtl8712/hal_init.c:330 [inline]\n rtl871x_hal_init+0xae/0x180 drivers/staging/rtl8712/hal_init.c:394\n netdev_open+0xe6/0x6c0 drivers/staging/rtl8712/os_intfs.c:380\n __dev_open+0x2bc/0x4d0 net/core/dev.c:1484\n\nFreed by task 1306:\n...\n release_firmware+0x1b/0x30 drivers/base/firmware_loader/main.c:1053\n r871xu_dev_remove+0xcc/0x2c0 drivers/staging/rtl8712/usb_intf.c:599\n usb_unbind_interface+0x1d8/0x8d0 drivers/usb/core/driver.c:458",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-47479"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a65c9afe9f2f55b7a7fb4a25ab654cd4139683a4",
          "url": "https://git.kernel.org/stable/c/a65c9afe9f2f55b7a7fb4a25ab654cd4139683a4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/befd23bd3b17f1a3f9c943a8580b47444c7c63ed",
          "url": "https://git.kernel.org/stable/c/befd23bd3b17f1a3f9c943a8580b47444c7c63ed"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c052cc1a069c3e575619cf64ec427eb41176ca70",
          "url": "https://git.kernel.org/stable/c/c052cc1a069c3e575619cf64ec427eb41176ca70"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c430094541a80575259a94ff879063ef01473506",
          "url": "https://git.kernel.org/stable/c/c430094541a80575259a94ff879063ef01473506"
        }
      ],
      "release_date": "2024-05-22T09:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-47458",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: mount fails with buffer overflow in strlen\n\nStarting with kernel 5.11 built with CONFIG_FORTIFY_SOURCE mouting an\nocfs2 filesystem with either o2cb or pcmk cluster stack fails with the\ntrace below.  Problem seems to be that strings for cluster stack and\ncluster name are not guaranteed to be null terminated in the disk\nrepresentation, while strlcpy assumes that the source string is always\nnull terminated.  This causes a read outside of the source string\ntriggering the buffer overflow detection.\n\n  detected buffer overflow in strlen\n  ------------[ cut here ]------------\n  kernel BUG at lib/string.c:1149!\n  invalid opcode: 0000 [#1] SMP PTI\n  CPU: 1 PID: 910 Comm: mount.ocfs2 Not tainted 5.14.0-1-amd64 #1\n    Debian 5.14.6-2\n  RIP: 0010:fortify_panic+0xf/0x11\n  ...\n  Call Trace:\n   ocfs2_initialize_super.isra.0.cold+0xc/0x18 [ocfs2]\n   ocfs2_fill_super+0x359/0x19b0 [ocfs2]\n   mount_bdev+0x185/0x1b0\n   legacy_get_tree+0x27/0x40\n   vfs_get_tree+0x25/0xb0\n   path_mount+0x454/0xa20\n   __x64_sys_mount+0x103/0x140\n   do_syscall_64+0x3b/0xc0\n   entry_SYSCALL_64_after_hwframe+0x44/0xae",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-47458"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0e677ea5b7396f715a76b6b0ef441430e4c4b57f",
          "url": "https://git.kernel.org/stable/c/0e677ea5b7396f715a76b6b0ef441430e4c4b57f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/232ed9752510de4436468b653d145565669c8498",
          "url": "https://git.kernel.org/stable/c/232ed9752510de4436468b653d145565669c8498"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4b74ddcc22ee6455946e80a9c4808801f8f8561e",
          "url": "https://git.kernel.org/stable/c/4b74ddcc22ee6455946e80a9c4808801f8f8561e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7623b1035ca2d17bde0f6a086ad6844a34648df1",
          "url": "https://git.kernel.org/stable/c/7623b1035ca2d17bde0f6a086ad6844a34648df1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/93be0eeea14cf39235e585c8f56df3b3859deaad",
          "url": "https://git.kernel.org/stable/c/93be0eeea14cf39235e585c8f56df3b3859deaad"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ac011cb3ff7a76b3e0e6e77158ee4ba2f929e1fb",
          "url": "https://git.kernel.org/stable/c/ac011cb3ff7a76b3e0e6e77158ee4ba2f929e1fb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b15fa9224e6e1239414525d8d556d824701849fc",
          "url": "https://git.kernel.org/stable/c/b15fa9224e6e1239414525d8d556d824701849fc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d3a83576378b4c904f711598dde2c5e881c4295c",
          "url": "https://git.kernel.org/stable/c/d3a83576378b4c904f711598dde2c5e881c4295c"
        }
      ],
      "release_date": "2024-05-22T07:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-46713",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/aux: Fix AUX buffer serialization\n\nOle reported that event->mmap_mutex is strictly insufficient to\nserialize the AUX buffer, add a per RB mutex to fully serialize it.\n\nNote that in the lock order comment the perf_event::mmap_mutex order\nwas already wrong, that is, it nesting under mmap_lock is not new with\nthis patch.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-46713"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2ab9d830262c132ab5db2f571003d80850d56b2a",
          "url": "https://git.kernel.org/stable/c/2ab9d830262c132ab5db2f571003d80850d56b2a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/52d13d224fdf1299c8b642807fa1ea14d693f5ff",
          "url": "https://git.kernel.org/stable/c/52d13d224fdf1299c8b642807fa1ea14d693f5ff"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7882923f1cb88dc1a17f2bf0c81b1fc80d44db82",
          "url": "https://git.kernel.org/stable/c/7882923f1cb88dc1a17f2bf0c81b1fc80d44db82"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9dc7ad2b67772cfb94ceb3b0c9c4023c2463215d",
          "url": "https://git.kernel.org/stable/c/9dc7ad2b67772cfb94ceb3b0c9c4023c2463215d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b9b6882e243b653d379abbeaa64a500182aba370",
          "url": "https://git.kernel.org/stable/c/b9b6882e243b653d379abbeaa64a500182aba370"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c4b69bee3f4ef76809288fe6827bc14d4ae788ef",
          "url": "https://git.kernel.org/stable/c/c4b69bee3f4ef76809288fe6827bc14d4ae788ef"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html",
          "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
        }
      ],
      "release_date": "2024-09-13T15:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49145",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: CPPC: Avoid out of bounds access when parsing _CPC data\n\nIf the NumEntries field in the _CPC return package is less than 2, do\nnot attempt to access the \"Revision\" element of that package, because\nit may not be present then.\n\nBugLink: https://lore.kernel.org/lkml/20220322143534.GC32582@xsang-OptiPlex-9020/",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49145"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/28d5387c1994f5e1e0d41b30a1f3dd6e1f609252",
          "url": "https://git.kernel.org/stable/c/28d5387c1994f5e1e0d41b30a1f3dd6e1f609252"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/40d8abf364bcab23bc715a9221a3c8623956257b",
          "url": "https://git.kernel.org/stable/c/40d8abf364bcab23bc715a9221a3c8623956257b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/97b5593fd1b182b3fdb180b6bbe64ec09669988b",
          "url": "https://git.kernel.org/stable/c/97b5593fd1b182b3fdb180b6bbe64ec09669988b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b3f15609ffa521de12244cd6af24002030dda3f5",
          "url": "https://git.kernel.org/stable/c/b3f15609ffa521de12244cd6af24002030dda3f5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b80b19b32a432c9eee1cd200ef7aaddf608f54d1",
          "url": "https://git.kernel.org/stable/c/b80b19b32a432c9eee1cd200ef7aaddf608f54d1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cb249f8c00f40dba83b7da8207ac14ca46e9ec9e",
          "url": "https://git.kernel.org/stable/c/cb249f8c00f40dba83b7da8207ac14ca46e9ec9e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d208ea44e25b31db5a4d5e8c31df51787a3e9303",
          "url": "https://git.kernel.org/stable/c/d208ea44e25b31db5a4d5e8c31df51787a3e9303"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d7339f2a3938fb56b5f28d53f5345900b5fa0e74",
          "url": "https://git.kernel.org/stable/c/d7339f2a3938fb56b5f28d53f5345900b5fa0e74"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e5b681822cac1f8093759b02e16c06b2c64b6788",
          "url": "https://git.kernel.org/stable/c/e5b681822cac1f8093759b02e16c06b2c64b6788"
        }
      ],
      "release_date": "2025-02-26T07:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-47383",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: Fix out-of-bound vmalloc access in imageblit\n\nThis issue happens when a userspace program does an ioctl\nFBIOPUT_VSCREENINFO passing the fb_var_screeninfo struct\ncontaining only the fields xres, yres, and bits_per_pixel\nwith values.\n\nIf this struct is the same as the previous ioctl, the\nvc_resize() detects it and doesn't call the resize_screen(),\nleaving the fb_var_screeninfo incomplete. And this leads to\nthe updatescrollmode() calculates a wrong value to\nfbcon_display->vrows, which makes the real_y() return a\nwrong value of y, and that value, eventually, causes\nthe imageblit to access an out-of-bound address value.\n\nTo solve this issue I made the resize_screen() be called\neven if the screen does not need any resizing, so it will\n\"fix and fill\" the fb_var_screeninfo independently.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-47383"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/067c694d06040db6f0c65281bb358452ca6d85b9",
          "url": "https://git.kernel.org/stable/c/067c694d06040db6f0c65281bb358452ca6d85b9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3b0c406124719b625b1aba431659f5cdc24a982c",
          "url": "https://git.kernel.org/stable/c/3b0c406124719b625b1aba431659f5cdc24a982c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/699d926585daa6ec44be556cdc1ab89e5d54557b",
          "url": "https://git.kernel.org/stable/c/699d926585daa6ec44be556cdc1ab89e5d54557b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/70aed03b1d5a5df974f456cdc8eedb213c94bb8b",
          "url": "https://git.kernel.org/stable/c/70aed03b1d5a5df974f456cdc8eedb213c94bb8b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7e71fcedfda6f7de18f850a6b36e78d78b04476f",
          "url": "https://git.kernel.org/stable/c/7e71fcedfda6f7de18f850a6b36e78d78b04476f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/883f7897a25e3ce14a7f274ca4c73f49ac84002a",
          "url": "https://git.kernel.org/stable/c/883f7897a25e3ce14a7f274ca4c73f49ac84002a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8a6a240f52e14356386030d8958ae8b1761d2325",
          "url": "https://git.kernel.org/stable/c/8a6a240f52e14356386030d8958ae8b1761d2325"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d570c48dd37dbe8fc6875d4461d01a9554ae2560",
          "url": "https://git.kernel.org/stable/c/d570c48dd37dbe8fc6875d4461d01a9554ae2560"
        }
      ],
      "release_date": "2024-05-21T15:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-37078",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: fix potential kernel bug due to lack of writeback flag waiting\n\nDestructive writes to a block device on which nilfs2 is mounted can cause\na kernel bug in the folio/page writeback start routine or writeback end\nroutine (__folio_start_writeback in the log below):\n\n kernel BUG at mm/page-writeback.c:3070!\n Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI\n ...\n RIP: 0010:__folio_start_writeback+0xbaa/0x10e0\n Code: 25 ff 0f 00 00 0f 84 18 01 00 00 e8 40 ca c6 ff e9 17 f6 ff ff\n  e8 36 ca c6 ff 4c 89 f7 48 c7 c6 80 c0 12 84 e8 e7 b3 0f 00 90 <0f>\n  0b e8 1f ca c6 ff 4c 89 f7 48 c7 c6 a0 c6 12 84 e8 d0 b3 0f 00\n ...\n Call Trace:\n  <TASK>\n  nilfs_segctor_do_construct+0x4654/0x69d0 [nilfs2]\n  nilfs_segctor_construct+0x181/0x6b0 [nilfs2]\n  nilfs_segctor_thread+0x548/0x11c0 [nilfs2]\n  kthread+0x2f0/0x390\n  ret_from_fork+0x4b/0x80\n  ret_from_fork_asm+0x1a/0x30\n  </TASK>\n\nThis is because when the log writer starts a writeback for segment summary\nblocks or a super root block that use the backing device's page cache, it\ndoes not wait for the ongoing folio/page writeback, resulting in an\ninconsistent writeback state.\n\nFix this issue by waiting for ongoing writebacks when putting\nfolios/pages on the backing device into writeback state.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-37078"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0ecfe3a92869a59668d27228dabbd7965e83567f",
          "url": "https://git.kernel.org/stable/c/0ecfe3a92869a59668d27228dabbd7965e83567f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1f3bff69f1214fe03a02bc650d5bbfaa6e65ae7d",
          "url": "https://git.kernel.org/stable/c/1f3bff69f1214fe03a02bc650d5bbfaa6e65ae7d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/271dcd977ccda8c7a26e360425ae7b4db7d2ecc0",
          "url": "https://git.kernel.org/stable/c/271dcd977ccda8c7a26e360425ae7b4db7d2ecc0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/33900d7eae616647e179eee1c66ebe654ee39627",
          "url": "https://git.kernel.org/stable/c/33900d7eae616647e179eee1c66ebe654ee39627"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/614d397be0cf43412b3f94a0f6460eddced8ce92",
          "url": "https://git.kernel.org/stable/c/614d397be0cf43412b3f94a0f6460eddced8ce92"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/95f6f81e50d858a7c9aa7c795ec14a0ac3819118",
          "url": "https://git.kernel.org/stable/c/95f6f81e50d858a7c9aa7c795ec14a0ac3819118"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a4ca369ca221bb7e06c725792ac107f0e48e82e7",
          "url": "https://git.kernel.org/stable/c/a4ca369ca221bb7e06c725792ac107f0e48e82e7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a75b8f493dfc48aa38c518430bd9e03b53bffebe",
          "url": "https://git.kernel.org/stable/c/a75b8f493dfc48aa38c518430bd9e03b53bffebe"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
        }
      ],
      "release_date": "2024-06-25T15:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-49519",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nath10k: skip ath10k_halt during suspend for driver state RESTARTING\n\nDouble free crash is observed when FW recovery(caused by wmi\ntimeout/crash) is followed by immediate suspend event. The FW recovery\nis triggered by ath10k_core_restart() which calls driver clean up via\nath10k_halt(). When the suspend event occurs between the FW recovery,\nthe restart worker thread is put into frozen state until suspend completes.\nThe suspend event triggers ath10k_stop() which again triggers ath10k_halt()\nThe double invocation of ath10k_halt() causes ath10k_htt_rx_free() to be\ncalled twice(Note: ath10k_htt_rx_alloc was not called by restart worker\nthread because of its frozen state), causing the crash.\n\nTo fix this, during the suspend flow, skip call to ath10k_halt() in\nath10k_stop() when the current driver state is ATH10K_STATE_RESTARTING.\nAlso, for driver state ATH10K_STATE_RESTARTING, call\nath10k_wait_for_suspend() in ath10k_stop(). This is because call to\nath10k_wait_for_suspend() is skipped later in\n[ath10k_halt() > ath10k_core_stop()] for the driver state\nATH10K_STATE_RESTARTING.\n\nThe frozen restart worker thread will be cancelled during resume when the\ndevice comes out of suspend.\n\nBelow is the crash stack for reference:\n\n[  428.469167] ------------[ cut here ]------------\n[  428.469180] kernel BUG at mm/slub.c:4150!\n[  428.469193] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n[  428.469219] Workqueue: events_unbound async_run_entry_fn\n[  428.469230] RIP: 0010:kfree+0x319/0x31b\n[  428.469241] RSP: 0018:ffffa1fac015fc30 EFLAGS: 00010246\n[  428.469247] RAX: ffffedb10419d108 RBX: ffff8c05262b0000\n[  428.469252] RDX: ffff8c04a8c07000 RSI: 0000000000000000\n[  428.469256] RBP: ffffa1fac015fc78 R08: 0000000000000000\n[  428.469276] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  428.469285] Call Trace:\n[  428.469295]  ? dma_free_attrs+0x5f/0x7d\n[  428.469320]  ath10k_core_stop+0x5b/0x6f\n[  428.469336]  ath10k_halt+0x126/0x177\n[  428.469352]  ath10k_stop+0x41/0x7e\n[  428.469387]  drv_stop+0x88/0x10e\n[  428.469410]  __ieee80211_suspend+0x297/0x411\n[  428.469441]  rdev_suspend+0x6e/0xd0\n[  428.469462]  wiphy_suspend+0xb1/0x105\n[  428.469483]  ? name_show+0x2d/0x2d\n[  428.469490]  dpm_run_callback+0x8c/0x126\n[  428.469511]  ? name_show+0x2d/0x2d\n[  428.469517]  __device_suspend+0x2e7/0x41b\n[  428.469523]  async_suspend+0x1f/0x93\n[  428.469529]  async_run_entry_fn+0x3d/0xd1\n[  428.469535]  process_one_work+0x1b1/0x329\n[  428.469541]  worker_thread+0x213/0x372\n[  428.469547]  kthread+0x150/0x15f\n[  428.469552]  ? pr_cont_work+0x58/0x58\n[  428.469558]  ? kthread_blkcg+0x31/0x31\n\nTested-on: QCA6174 hw3.2 PCI WLAN.RM.4.4.1-00288-QCARMSWPZ-1",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-49519"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5321e5211b5dc873e2e3d0deb749e69ecf4dbfe5",
          "url": "https://git.kernel.org/stable/c/5321e5211b5dc873e2e3d0deb749e69ecf4dbfe5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7eb14cb604f49e58b7cf6faa87961a865a3c8649",
          "url": "https://git.kernel.org/stable/c/7eb14cb604f49e58b7cf6faa87961a865a3c8649"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8aa3750986ffcf73e0692db3b40dd3a8e8c0c575",
          "url": "https://git.kernel.org/stable/c/8aa3750986ffcf73e0692db3b40dd3a8e8c0c575"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b72a4aff947ba807177bdabb43debaf2c66bee05",
          "url": "https://git.kernel.org/stable/c/b72a4aff947ba807177bdabb43debaf2c66bee05"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c2272428090d0d215a3f017cbbbad731c07eee53",
          "url": "https://git.kernel.org/stable/c/c2272428090d0d215a3f017cbbbad731c07eee53"
        }
      ],
      "release_date": "2025-02-26T07:01:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-22079",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: validate l_tree_depth to avoid out-of-bounds access\n\nThe l_tree_depth field is 16-bit (__le16), but the actual maximum depth is\nlimited to OCFS2_MAX_PATH_DEPTH.\n\nAdd a check to prevent out-of-bounds access if l_tree_depth has an invalid\nvalue, which may occur when reading from a corrupted mounted disk [1].",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-22079"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/11e24802e73362aa2948ee16b8fb4e32635d5b2a",
          "url": "https://git.kernel.org/stable/c/11e24802e73362aa2948ee16b8fb4e32635d5b2a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/17c99ab3db2ba74096d36c69daa6e784e98fc0b8",
          "url": "https://git.kernel.org/stable/c/17c99ab3db2ba74096d36c69daa6e784e98fc0b8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3d012ba4404a0bb517658699ba85e6abda386dc3",
          "url": "https://git.kernel.org/stable/c/3d012ba4404a0bb517658699ba85e6abda386dc3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/49d2a2ea9d30991bae82107f9523915b91637683",
          "url": "https://git.kernel.org/stable/c/49d2a2ea9d30991bae82107f9523915b91637683"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/538ed8b049ef801a86c543433e5061a91cc106e3",
          "url": "https://git.kernel.org/stable/c/538ed8b049ef801a86c543433e5061a91cc106e3"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a406aff8c05115119127c962cbbbbd202e1973ef",
          "url": "https://git.kernel.org/stable/c/a406aff8c05115119127c962cbbbbd202e1973ef"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b942f88fe7d2d789e51c5c30a675fa1c126f5a6d",
          "url": "https://git.kernel.org/stable/c/b942f88fe7d2d789e51c5c30a675fa1c126f5a6d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e95d97c9c8cd0c239b7b59c79be0f6a9dcf7905c",
          "url": "https://git.kernel.org/stable/c/e95d97c9c8cd0c239b7b59c79be0f6a9dcf7905c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ef34840bda333fe99bafbd2d73b70ceaaf9eba66",
          "url": "https://git.kernel.org/stable/c/ef34840bda333fe99bafbd2d73b70ceaaf9eba66"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
        }
      ],
      "release_date": "2025-04-16T15:16:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-58014",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy()\n\nIn 'wlc_phy_iqcal_gainparams_nphy()', add gain range check to WARN()\ninstead of possible out-of-bounds 'tbl_iqcal_gainparams_nphy' access.\nCompile tested only.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-58014"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/093286c33409bf38896f2dab0c0bb6ca388afb33",
          "url": "https://git.kernel.org/stable/c/093286c33409bf38896f2dab0c0bb6ca388afb33"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0a457223cb2b9ca46bae7de387d0f4c093b0220d",
          "url": "https://git.kernel.org/stable/c/0a457223cb2b9ca46bae7de387d0f4c093b0220d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/13ef16c4fe384b1e70277bbe1d87934ee6c81e12",
          "url": "https://git.kernel.org/stable/c/13ef16c4fe384b1e70277bbe1d87934ee6c81e12"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3f4a0948c3524ae50f166dbc6572a3296b014e62",
          "url": "https://git.kernel.org/stable/c/3f4a0948c3524ae50f166dbc6572a3296b014e62"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6f6e293246dc1f5b2b6b3d0f2d757598489cda79",
          "url": "https://git.kernel.org/stable/c/6f6e293246dc1f5b2b6b3d0f2d757598489cda79"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ada9df08b3ef683507e75b92f522fb659260147f",
          "url": "https://git.kernel.org/stable/c/ada9df08b3ef683507e75b92f522fb659260147f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c27ce584d274f6ad3cba2294497de824a3c66646",
          "url": "https://git.kernel.org/stable/c/c27ce584d274f6ad3cba2294497de824a3c66646"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d280a12e9b87819a8a209639d600b48a2d6d65dc",
          "url": "https://git.kernel.org/stable/c/d280a12e9b87819a8a209639d600b48a2d6d65dc"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        }
      ],
      "release_date": "2025-02-27T03:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-21772",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npartitions: mac: fix handling of bogus partition table\n\nFix several issues in partition probing:\n\n - The bailout for a bad partoffset must use put_dev_sector(), since the\n   preceding read_part_sector() succeeded.\n - If the partition table claims a silly sector size like 0xfff bytes\n   (which results in partition table entries straddling sector boundaries),\n   bail out instead of accessing out-of-bounds memory.\n - We must not assume that the partition table contains proper NUL\n   termination - use strnlen() and strncmp() instead of strlen() and\n   strcmp().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-21772"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/213ba5bd81b7e97ac6e6190b8f3bc6ba76123625",
          "url": "https://git.kernel.org/stable/c/213ba5bd81b7e97ac6e6190b8f3bc6ba76123625"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/27a39d006f85e869be68c1d5d2ce05e5d6445bf5",
          "url": "https://git.kernel.org/stable/c/27a39d006f85e869be68c1d5d2ce05e5d6445bf5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/40a35d14f3c0dc72b689061ec72fc9b193f37d1f",
          "url": "https://git.kernel.org/stable/c/40a35d14f3c0dc72b689061ec72fc9b193f37d1f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6578717ebca91678131d2b1f4ba4258e60536e9f",
          "url": "https://git.kernel.org/stable/c/6578717ebca91678131d2b1f4ba4258e60536e9f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7fa9706722882f634090bfc9af642bf9ed719e27",
          "url": "https://git.kernel.org/stable/c/7fa9706722882f634090bfc9af642bf9ed719e27"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/80e648042e512d5a767da251d44132553fe04ae0",
          "url": "https://git.kernel.org/stable/c/80e648042e512d5a767da251d44132553fe04ae0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/92527100be38ede924768f4277450dfe8a40e16b",
          "url": "https://git.kernel.org/stable/c/92527100be38ede924768f4277450dfe8a40e16b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a3e77da9f843e4ab93917d30c314f0283e28c124",
          "url": "https://git.kernel.org/stable/c/a3e77da9f843e4ab93917d30c314f0283e28c124"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00028.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
        }
      ],
      "release_date": "2025-02-27T03:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38352",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nposix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()\nIf an exiting non-autoreaping task has already passed exit_notify() and\ncalls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent\nor debugger right after unlock_task_sighand().\nIf a concurrent posix_cpu_timer_del() runs at that moment, it won't be\nable to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or\nlock_task_sighand() will fail.\nAdd the tsk->exit_state check into run_posix_cpu_timers() to fix this.\nThis fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because\nexit_task_work() is called before exit_notify(). But the check still\nmakes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail\nanyway in this case.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38352"
        }
      ],
      "release_date": "2025-07-22T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-36880",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: qca: add missing firmware sanity checks\n\nAdd the missing sanity checks when parsing the firmware files before\ndownloading them to avoid accessing and corrupting memory beyond the\nvmalloced buffer.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
          "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
          "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-36880"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/02f05ed44b71152d5e11d29be28aed91c0489b4e",
          "url": "https://git.kernel.org/stable/c/02f05ed44b71152d5e11d29be28aed91c0489b4e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1caceadfb50432dbf6d808796cb6c34ebb6d662c",
          "url": "https://git.kernel.org/stable/c/1caceadfb50432dbf6d808796cb6c34ebb6d662c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2e4edfa1e2bd821a317e7d006517dcf2f3fac68d",
          "url": "https://git.kernel.org/stable/c/2e4edfa1e2bd821a317e7d006517dcf2f3fac68d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/427281f9498ed614f9aabc80e46ec077c487da6d",
          "url": "https://git.kernel.org/stable/c/427281f9498ed614f9aabc80e46ec077c487da6d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ed53949cc92e28aaa3463d246942bda1fbb7f307",
          "url": "https://git.kernel.org/stable/c/ed53949cc92e28aaa3463d246942bda1fbb7f307"
        }
      ],
      "release_date": "2024-05-30T16:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-buildinfo-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-cloud-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-doc-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-headers-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-image-unsigned-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-libc-dev-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-modules-extra-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-source-4.4.0-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-generic-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-4.4.0-280-tuxcare.els51-lowlatency-0:4.4.0-280.314.amd64",
            "Ubuntu-16:linux-tools-common-0:4.4.0-280.314.all",
            "Ubuntu-16:linux-tools-host-0:4.4.0-280.314.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}