{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "* CVE-url: https://ubuntu.com/security/CVE-2025-21858\n     - geneve: Fix use-after-free in geneve_find_dev().\n   * CVE-url: https://ubuntu.com/security/CVE-2024-36921\n     - wifi: iwlwifi: mvm: guard against invalid STA ID on removal\n   * CVE-url: https://ubuntu.com/security/CVE-2023-52621\n     - bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers\n   * CVE-url: https://ubuntu.com/security/CVE-2025-21855\n     - ibmvnic: Don't reference skb after sending to VIOS\n   * CVE-url: https://ubuntu.com/security/CVE-2021-47110\n     - x86/kvm: Disable kvmclock on all CPUs on shutdown\n   * CVE-url: https://ubuntu.com/security/CVE-2025-21791\n     - vrf: use RCU protection in l3mdev_l3_out()\n   * CVE-url: https://ubuntu.com/security/CVE-2024-57980\n     - media: uvcvideo: Fix double free in error path\n   * CVE-url: https://ubuntu.com/security/CVE-2025-21718\n     - net: rose: fix timer races against user threads\n   * CVE-url: https://ubuntu.com/security/CVE-2025-21735\n     - NFC: nci: Add bounds checking in nci_hci_create_pipe()\n   * CVE-url: https://ubuntu.com/security/CVE-2023-52805\n     - jfs: fix array-index-out-of-bounds in diAlloc\n   * CVE-url: https://ubuntu.com/security/CVE-2023-52847\n     - media: bttv: fix use after free error due to btv->timeout timer\n   * CVE-url: https://ubuntu.com/security/CVE-2024-41014\n     - xfs: add bounds checking to xlog_recover_process_data\n   * CVE-url: https://ubuntu.com/security/CVE-2025-21782\n     - orangefs: fix a oob in orangefs_debug_write\n   * CVE-url: https://ubuntu.com/security/CVE-2024-26872\n     - RDMA/srpt: Do not register event handler until srpt device is fully setup\n   * CVE-url: https://ubuntu.com/security/CVE-2024-26982\n     - Squashfs: check the inode number is not the invalid value of zero\n   * CVE-url: https://ubuntu.com/security/CVE-2024-56548\n     - hfsplus: don't query the device logical block size multiple times\n   * CVE-url: https://ubuntu.com/security/CVE-2024-57850\n     - jffs2: Prevent rtime decompress memory corruption\n   * CVE-url: https://ubuntu.com/security/CVE-2024-49982\n     - aoe: fix the potential use-after-free problem in more places\n   * CVE-url: https://ubuntu.com/security/CVE-2024-47696\n     - RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency\n   * CVE-url: https://ubuntu.com/security/CVE-2024-50074\n     - parport: Proper fix for array out-of-bounds access\n   * CVE-url: https://ubuntu.com/security/CVE-2025-21687\n     - vfio/platform: check the bounds of read/write syscalls\n   * CVE-url: https://ubuntu.com/security/CVE-2024-57889\n     - regmap: allow to disable all locking mechanisms\n     - pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking\n   * CVE-url: https://ubuntu.com/security/CVE-2024-56539\n     - wifi: mwifiex: Fix memcpy() field-spanning write warning in\n       mwifiex_config_scan()\n   * CVE-url: https://ubuntu.com/security/CVE-2024-53680\n     - ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init()\n   * CVE-url: https://ubuntu.com/security/CVE-2024-56630\n     - ocfs2: free inode when ocfs2_get_init_inode() fails\n   * CVE-url: https://ubuntu.com/security/CVE-2024-53184\n     - um: ubd: Do not use drvdata in release\n   * CVE-url: https://ubuntu.com/security/CVE-2024-57884\n     - mm: vmscan: account for free pages to prevent infinite Loop in\n       throttle_direct_reclaim()\n   * CVE-url: https://ubuntu.com/security/CVE-2024-56597\n     - jfs: fix shift-out-of-bounds in dbSplit\n   * CVE-url: https://ubuntu.com/security/CVE-2025-21664\n     - dm thin: make get_first_thin use rcu-safe list first function\n   * CVE-url: https://ubuntu.com/security/CVE-2024-56594\n     - drm/amdgpu: set the right AMDGPU sg segment limitation\n   * CVE-url: https://ubuntu.com/security/CVE-2024-56681\n     - crypto: bcm - add error check in the ahash_hmac_init function\n   * CVE-url: https://ubuntu.com/security/CVE-2024-52332\n     - igb: Fix potential invalid memory access in igb_init_module()\n   * CVE-url: https://ubuntu.com/security/CVE-2024-56570\n     - ovl: Filter invalid inodes with missing lookup function\n   * CVE-url: https://ubuntu.com/security/CVE-2024-57912\n     - iio: pressure: zpa2326: fix information leak in triggered buffer\n   * CVE-url: https://ubuntu.com/security/CVE-2024-53172\n     - ubi: fastmap: Fix duplicate slab cache names while attaching\n   * CVE-url: https://ubuntu.com/security/CVE-2024-57929\n     - dm array: fix releasing a faulty array block twice in dm_array_cursor_end\n   * CVE-url: https://ubuntu.com/security/CVE-2024-56532\n     - ALSA: us122l: Use snd_card_free_when_closed() at disconnection\n   * CVE-url: https://ubuntu.com/security/CVE-2024-53183\n     - um: net: Do not use drvdata in release\n   * CVE-url: https://ubuntu.com/security/CVE-2024-56644\n     - net/ipv6: release expired exception dst cached in socket\n   * CVE-url: https://ubuntu.com/security/CVE-2024-57948\n     - mac802154: check local interfaces before deleting sdata list\n   * CVE-url: https://ubuntu.com/security/CVE-2024-57904\n     - iio: adc: at91: call input_free_device() on allocated iio_dev\n   * CVE-url: https://ubuntu.com/security/CVE-2024-56637\n     - netfilter: ipset: Hold module reference while requesting a module\n   * CVE-url: https://ubuntu.com/security/CVE-2024-56576\n     - media: i2c: tc358743: Fix crash in the probe error path when using polling\n   * CVE-url: https://ubuntu.com/security/CVE-2024-53214\n     - vfio/pci: Properly hide first-in-list PCIe extended capability\n   * CVE-url: https://ubuntu.com/security/CVE-2024-56700\n     - media: wl128x: Fix atomicity violation in fmc_send_cmd()\n   * CVE-url: https://ubuntu.com/security/CVE-2024-56531\n     - ALSA: caiaq: Use snd_card_free_when_closed() at disconnection\n   * CVE-url: https://ubuntu.com/security/CVE-2024-53194\n     - PCI: Fix use-after-free of slot->bus on hot remove\n   * CVE-url: https://ubuntu.com/security/CVE-2024-58055\n     - usb: gadget: f_tcm: Don't free command immediately\n   * CVE-url: https://ubuntu.com/security/CVE-2024-56619\n     - nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry()\n   * CVE-url: https://ubuntu.com/security/CVE-2021-47636\n     - ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock()\n   * CVE-url: https://ubuntu.com/security/CVE-2024-5317\n     - nfsd: make sure exp active before svc_export_show\n   * CVE-url: https://ubuntu.com/security/CVE-2024-53174\n     - SUNRPC: make sure cache entry active before cache_show\n   * CVE-url: https://ubuntu.com/security/CVE-2021-47219\n     - scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs()\n   * CVE-url: https://ubuntu.com/security/CVE-2024-50269\n     - usb: musb: sunxi: Fix accessing an released usb phy\n   * CVE-url: https://ubuntu.com/security/CVE-2024-57908\n     - iio: imu: kmx61: fix information leak in triggered buffer",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/ubuntu18.04els/advisories/2025/clsa-2025_1744213128.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2025:1744213128",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1744213128"
      }
    ],
    "tracking": {
      "current_release_date": "2025-05-19T15:23:20Z",
      "generator": {
        "date": "2025-05-19T15:23:20Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1744213128",
      "initial_release_date": "2025-04-09T15:38:50Z",
      "revision_history": [
        {
          "date": "2025-04-09T15:38:50Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-05-19T15:23:20Z",
          "number": "2",
          "summary": "Official Publication"
        }
      ],
      "status": "final",
      "version": "2"
    },
    "title": "Fix of 55 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Ubuntu 18.04",
                "product": {
                  "name": "Ubuntu 18.04",
                  "product_id": "Ubuntu-18",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Ubuntu"
          }
        ],
        "category": "vendor",
        "name": "Canonical Ltd."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "linux-image-generic-0:4.15.0.246.257.amd64",
                "product": {
                  "name": "linux-image-generic-0:4.15.0.246.257.amd64",
                  "product_id": "linux-image-generic-0:4.15.0.246.257.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-image-generic@4.15.0.246.257?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-4.15.0-246-tuxcare.els34-0:4.15.0-246.257.amd64",
                "product": {
                  "name": "linux-tools-4.15.0-246-tuxcare.els34-0:4.15.0-246.257.amd64",
                  "product_id": "linux-tools-4.15.0-246-tuxcare.els34-0:4.15.0-246.257.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-tools-4.15.0-246-tuxcare.els34@4.15.0-246.257?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-cloud-tools-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
                "product": {
                  "name": "linux-cloud-tools-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
                  "product_id": "linux-cloud-tools-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-cloud-tools-4.15.0-246-tuxcare.els34-generic@4.15.0-246.257?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-generic-0:4.15.0.246.257.amd64",
                "product": {
                  "name": "linux-generic-0:4.15.0.246.257.amd64",
                  "product_id": "linux-generic-0:4.15.0.246.257.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-generic@4.15.0.246.257?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-modules-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
                "product": {
                  "name": "linux-modules-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
                  "product_id": "linux-modules-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-modules-4.15.0-246-tuxcare.els34-lowlatency@4.15.0-246.257?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-headers-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
                "product": {
                  "name": "linux-headers-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
                  "product_id": "linux-headers-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-headers-4.15.0-246-tuxcare.els34-lowlatency@4.15.0-246.257?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-cloud-tools-lowlatency-0:4.15.0.246.257.amd64",
                "product": {
                  "name": "linux-cloud-tools-lowlatency-0:4.15.0.246.257.amd64",
                  "product_id": "linux-cloud-tools-lowlatency-0:4.15.0.246.257.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-cloud-tools-lowlatency@4.15.0.246.257?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-modules-extra-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
                "product": {
                  "name": "linux-modules-extra-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
                  "product_id": "linux-modules-extra-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-modules-extra-4.15.0-246-tuxcare.els34-generic@4.15.0-246.257?arch=amd64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "linux-tools-host-0:4.15.0-246.257.all",
                "product": {
                  "name": "linux-tools-host-0:4.15.0-246.257.all",
                  "product_id": "linux-tools-host-0:4.15.0-246.257.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-tools-host@4.15.0-246.257?arch=all"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-doc-0:4.15.0-246.257.all",
                "product": {
                  "name": "linux-doc-0:4.15.0-246.257.all",
                  "product_id": "linux-doc-0:4.15.0-246.257.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/cloudlinux/linux-doc@4.15.0-246.257?arch=all"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "all"
          }
        ],
        "category": "vendor",
        "name": "CloudLinux"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-image-generic-0:4.15.0.246.257.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-image-generic-0:4.15.0.246.257.amd64"
        },
        "product_reference": "linux-image-generic-0:4.15.0.246.257.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-4.15.0-246-tuxcare.els34-0:4.15.0-246.257.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-tools-4.15.0-246-tuxcare.els34-0:4.15.0-246.257.amd64"
        },
        "product_reference": "linux-tools-4.15.0-246-tuxcare.els34-0:4.15.0-246.257.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-cloud-tools-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-cloud-tools-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64"
        },
        "product_reference": "linux-cloud-tools-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-generic-0:4.15.0.246.257.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-generic-0:4.15.0.246.257.amd64"
        },
        "product_reference": "linux-generic-0:4.15.0.246.257.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-modules-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-modules-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64"
        },
        "product_reference": "linux-modules-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-headers-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-headers-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64"
        },
        "product_reference": "linux-headers-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-host-0:4.15.0-246.257.all as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-tools-host-0:4.15.0-246.257.all"
        },
        "product_reference": "linux-tools-host-0:4.15.0-246.257.all",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-doc-0:4.15.0-246.257.all as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-doc-0:4.15.0-246.257.all"
        },
        "product_reference": "linux-doc-0:4.15.0-246.257.all",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-cloud-tools-lowlatency-0:4.15.0.246.257.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-cloud-tools-lowlatency-0:4.15.0.246.257.amd64"
        },
        "product_reference": "linux-cloud-tools-lowlatency-0:4.15.0.246.257.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-modules-extra-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64 as a component of Ubuntu 18.04",
          "product_id": "Ubuntu-18:linux-modules-extra-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64"
        },
        "product_reference": "linux-modules-extra-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
        "relates_to_product_reference": "Ubuntu-18"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-5317",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
      },
      "notes": [
        {
          "category": "description",
          "text": "The Newsletter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'np1' parameter in all versions up to, and including, 8.3.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-image-generic-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-tools-4.15.0-246-tuxcare.els34-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-generic-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-modules-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-headers-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-tools-host-0:4.15.0-246.257.all",
          "Ubuntu-18:linux-doc-0:4.15.0-246.257.all",
          "Ubuntu-18:linux-cloud-tools-lowlatency-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-5317"
        },
        {
          "category": "external",
          "summary": "https://plugins.trac.wordpress.org/changeset/3095002/newsletter",
          "url": "https://plugins.trac.wordpress.org/changeset/3095002/newsletter"
        },
        {
          "category": "external",
          "summary": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4876e05e-efa6-46c6-832b-9ecc42934998?source=cve",
          "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4876e05e-efa6-46c6-832b-9ecc42934998?source=cve"
        }
      ],
      "release_date": "2024-06-05T02:15:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-image-generic-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-tools-4.15.0-246-tuxcare.els34-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-generic-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-modules-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-headers-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-tools-host-0:4.15.0-246.257.all",
            "Ubuntu-18:linux-doc-0:4.15.0-246.257.all",
            "Ubuntu-18:linux-cloud-tools-lowlatency-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Medium"
        }
      ]
    },
    {
      "cve": "CVE-2024-56539",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nwifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_config_scan()\nReplace one-element array with a flexible-array member in `struct\nmwifiex_ie_types_wildcard_ssid_params` to fix the following warning\non a MT8173 Chromebook (mt8173-elm-hana):\n[  356.775250] ------------[ cut here ]------------\n[  356.784543] memcpy: detected field-spanning write (size 6) of single field \"wildcard_ssid_tlv->ssid\" at drivers/net/wireless/marvell/mwifiex/scan.c:904 (size 1)\n[  356.813403] WARNING: CPU: 3 PID: 742 at drivers/net/wireless/marvell/mwifiex/scan.c:904 mwifiex_scan_networks+0x4fc/0xf28 [mwifiex]\nThe \"(size 6)\" above is exactly the length of the SSID of the network\nthis device was connected to. The source of the warning looks like:\nssid_len = user_scan_in->ssid_list[i].ssid_len;\n[...]\nmemcpy(wildcard_ssid_tlv->ssid,\nuser_scan_in->ssid_list[i].ssid, ssid_len);\nThere is a #define WILDCARD_SSID_TLV_MAX_SIZE that uses sizeof() on this\nstruct, but it already didn't account for the size of the one-element\narray, so it doesn't need to be changed.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-image-generic-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-tools-4.15.0-246-tuxcare.els34-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-generic-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-modules-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-headers-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-tools-host-0:4.15.0-246.257.all",
          "Ubuntu-18:linux-doc-0:4.15.0-246.257.all",
          "Ubuntu-18:linux-cloud-tools-lowlatency-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-56539"
        }
      ],
      "release_date": "2024-12-27T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-image-generic-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-tools-4.15.0-246-tuxcare.els34-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-generic-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-modules-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-headers-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-tools-host-0:4.15.0-246.257.all",
            "Ubuntu-18:linux-doc-0:4.15.0-246.257.all",
            "Ubuntu-18:linux-cloud-tools-lowlatency-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Medium"
        }
      ]
    },
    {
      "cve": "CVE-2024-56630",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nocfs2: free inode when ocfs2_get_init_inode() fails\nsyzbot is reporting busy inodes after unmount, for commit 9c89fe0af826\n(\"ocfs2: Handle error from dquot_initialize()\") forgot to call iput() when\nnew_inode() succeeded and dquot_initialize() failed.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-image-generic-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-tools-4.15.0-246-tuxcare.els34-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-generic-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-modules-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-headers-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-tools-host-0:4.15.0-246.257.all",
          "Ubuntu-18:linux-doc-0:4.15.0-246.257.all",
          "Ubuntu-18:linux-cloud-tools-lowlatency-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-56630"
        }
      ],
      "release_date": "2024-12-27T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-image-generic-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-tools-4.15.0-246-tuxcare.els34-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-generic-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-modules-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-headers-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-tools-host-0:4.15.0-246.257.all",
            "Ubuntu-18:linux-doc-0:4.15.0-246.257.all",
            "Ubuntu-18:linux-cloud-tools-lowlatency-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Medium"
        }
      ]
    },
    {
      "cve": "CVE-2024-56532",
      "cwe": {
        "id": "CWE-459",
        "name": "Incomplete Cleanup"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nALSA: us122l: Use snd_card_free_when_closed() at disconnection\nThe USB disconnect callback is supposed to be short and not too-long\nwaiting.  OTOH, the current code uses snd_card_free() at\ndisconnection, but this waits for the close of all used fds, hence it\ncan take long.  It eventually blocks the upper layer USB ioctls, which\nmay trigger a soft lockup.\nAn easy workaround is to replace snd_card_free() with\nsnd_card_free_when_closed().  This variant returns immediately while\nthe release of resources is done asynchronously by the card device\nrelease at the last close.\nThe loop of us122l->mmap_count check is dropped as well.  The check is\nuseless for the asynchronous operation with *_when_closed().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-image-generic-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-tools-4.15.0-246-tuxcare.els34-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-generic-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-modules-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-headers-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-tools-host-0:4.15.0-246.257.all",
          "Ubuntu-18:linux-doc-0:4.15.0-246.257.all",
          "Ubuntu-18:linux-cloud-tools-lowlatency-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-56532"
        }
      ],
      "release_date": "2024-12-27T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-image-generic-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-tools-4.15.0-246-tuxcare.els34-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-generic-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-modules-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-headers-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-tools-host-0:4.15.0-246.257.all",
            "Ubuntu-18:linux-doc-0:4.15.0-246.257.all",
            "Ubuntu-18:linux-cloud-tools-lowlatency-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Medium"
        }
      ]
    },
    {
      "cve": "CVE-2021-47636",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock()\n\nFunction ubifs_wbuf_write_nolock() may access buf out of bounds in\nfollowing process:\n\nubifs_wbuf_write_nolock():\n  aligned_len = ALIGN(len, 8);   // Assume len = 4089, aligned_len = 4096\n  if (aligned_len <= wbuf->avail) ... // Not satisfy\n  if (wbuf->used) {\n    ubifs_leb_write()  // Fill some data in avail wbuf\n    len -= wbuf->avail;   // len is still not 8-bytes aligned\n    aligned_len -= wbuf->avail;\n  }\n  n = aligned_len >> c->max_write_shift;\n  if (n) {\n    n <<= c->max_write_shift;\n    err = ubifs_leb_write(c, wbuf->lnum, buf + written,\n                          wbuf->offs, n);\n    // n > len, read out of bounds less than 8(n-len) bytes\n  }\n\n, which can be catched by KASAN:\n  =========================================================\n  BUG: KASAN: slab-out-of-bounds in ecc_sw_hamming_calculate+0x1dc/0x7d0\n  Read of size 4 at addr ffff888105594ff8 by task kworker/u8:4/128\n  Workqueue: writeback wb_workfn (flush-ubifs_0_0)\n  Call Trace:\n    kasan_report.cold+0x81/0x165\n    nand_write_page_swecc+0xa9/0x160\n    ubifs_leb_write+0xf2/0x1b0 [ubifs]\n    ubifs_wbuf_write_nolock+0x421/0x12c0 [ubifs]\n    write_head+0xdc/0x1c0 [ubifs]\n    ubifs_jnl_write_inode+0x627/0x960 [ubifs]\n    wb_workfn+0x8af/0xb80\n\nFunction ubifs_wbuf_write_nolock() accepts that parameter 'len' is not 8\nbytes aligned, the 'len' represents the true length of buf (which is\nallocated in 'ubifs_jnl_xxx', eg. ubifs_jnl_write_inode), so\nubifs_wbuf_write_nolock() must handle the length read from 'buf' carefully\nto write leb safely.\n\nFetch a reproducer in [Link].",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-image-generic-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-tools-4.15.0-246-tuxcare.els34-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-generic-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-modules-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-headers-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-tools-host-0:4.15.0-246.257.all",
          "Ubuntu-18:linux-doc-0:4.15.0-246.257.all",
          "Ubuntu-18:linux-cloud-tools-lowlatency-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-47636"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/07a209fadee7b53b46858538e1177597273862e4",
          "url": "https://git.kernel.org/stable/c/07a209fadee7b53b46858538e1177597273862e4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/3b7fb89135a20587d57f8877c02e25003e9edbdf",
          "url": "https://git.kernel.org/stable/c/3b7fb89135a20587d57f8877c02e25003e9edbdf"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4f2262a334641e05f645364d5ade1f565c85f20b",
          "url": "https://git.kernel.org/stable/c/4f2262a334641e05f645364d5ade1f565c85f20b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5343575aa11c5d7044107d59d43f84aec01312b0",
          "url": "https://git.kernel.org/stable/c/5343575aa11c5d7044107d59d43f84aec01312b0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a7054aaf1909cf40489c0ec1b728fdcf79c751a6",
          "url": "https://git.kernel.org/stable/c/a7054aaf1909cf40489c0ec1b728fdcf79c751a6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b80ccbec0e4804436c382d7dd60e943c386ed83a",
          "url": "https://git.kernel.org/stable/c/b80ccbec0e4804436c382d7dd60e943c386ed83a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e09fa5318d51f522e1af4fbaf8f74999355980c8",
          "url": "https://git.kernel.org/stable/c/e09fa5318d51f522e1af4fbaf8f74999355980c8"
        }
      ],
      "release_date": "2025-02-26T06:37:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-image-generic-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-tools-4.15.0-246-tuxcare.els34-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-generic-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-modules-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-headers-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-tools-host-0:4.15.0-246.257.all",
            "Ubuntu-18:linux-doc-0:4.15.0-246.257.all",
            "Ubuntu-18:linux-cloud-tools-lowlatency-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2024-57948",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nmac802154: check local interfaces before deleting sdata list\nsyzkaller reported a corrupted list in ieee802154_if_remove. [1]\nRemove an IEEE 802.15.4 network interface after unregister an IEEE 802.15.4\nhardware device from the system.\nCPU0CPU1\n========\ngenl_family_rcv_msg_doitieee802154_unregister_hw\nieee802154_del_ifaceieee802154_remove_interfaces\nrdev_del_virtual_intf_deprecatedlist_del(&sdata->list)\nieee802154_if_remove\nlist_del_rcu\nThe net device has been unregistered, since the rcu grace period,\nunregistration must be run before ieee802154_if_remove.\nTo avoid this issue, add a check for local->interfaces before deleting\nsdata list.\n[1]\nkernel BUG at lib/list_debug.c:58!\nOops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI\nCPU: 0 UID: 0 PID: 6277 Comm: syz-executor157 Not tainted 6.12.0-rc6-syzkaller-00005-g557329bcecc2 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\nRIP: 0010:__list_del_entry_valid_or_report+0xf4/0x140 lib/list_debug.c:56\nCode: e8 a1 7e 00 07 90 0f 0b 48 c7 c7 e0 37 60 8c 4c 89 fe e8 8f 7e 00 07 90 0f 0b 48 c7 c7 40 38 60 8c 4c 89 fe e8 7d 7e 00 07 90 <0f> 0b 48 c7 c7 a0 38 60 8c 4c 89 fe e8 6b 7e 00 07 90 0f 0b 48 c7\nRSP: 0018:ffffc9000490f3d0 EFLAGS: 00010246\nRAX: 000000000000004e RBX: dead000000000122 RCX: d211eee56bb28d00\nRDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000\nRBP: ffff88805b278dd8 R08: ffffffff8174a12c R09: 1ffffffff2852f0d\nR10: dffffc0000000000 R11: fffffbfff2852f0e R12: dffffc0000000000\nR13: dffffc0000000000 R14: dead000000000100 R15: ffff88805b278cc0\nFS:  0000555572f94380(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000056262e4a3000 CR3: 0000000078496000 CR4: 00000000003526f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n<TASK>\n__list_del_entry_valid include/linux/list.h:124 [inline]\n__list_del_entry include/linux/list.h:215 [inline]\nlist_del_rcu include/linux/rculist.h:157 [inline]\nieee802154_if_remove+0x86/0x1e0 net/mac802154/iface.c:687\nrdev_del_virtual_intf_deprecated net/ieee802154/rdev-ops.h:24 [inline]\nieee802154_del_iface+0x2c0/0x5c0 net/ieee802154/nl-phy.c:323\ngenl_family_rcv_msg_doit net/netlink/genetlink.c:1115 [inline]\ngenl_family_rcv_msg net/netlink/genetlink.c:1195 [inline]\ngenl_rcv_msg+0xb14/0xec0 net/netlink/genetlink.c:1210\nnetlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2551\ngenl_rcv+0x28/0x40 net/netlink/genetlink.c:1219\nnetlink_unicast_kernel net/netlink/af_netlink.c:1331 [inline]\nnetlink_unicast+0x7f6/0x990 net/netlink/af_netlink.c:1357\nnetlink_sendmsg+0x8e4/0xcb0 net/netlink/af_netlink.c:1901\nsock_sendmsg_nosec net/socket.c:729 [inline]\n__sock_sendmsg+0x221/0x270 net/socket.c:744\n____sys_sendmsg+0x52a/0x7e0 net/socket.c:2607\n___sys_sendmsg net/socket.c:2661 [inline]\n__sys_sendmsg+0x292/0x380 net/socket.c:2690\ndo_syscall_x64 arch/x86/entry/common.c:52 [inline]\ndo_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\nentry_SYSCALL_64_after_hwframe+0x77/0x7f",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-image-generic-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-tools-4.15.0-246-tuxcare.els34-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-generic-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-modules-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-headers-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-tools-host-0:4.15.0-246.257.all",
          "Ubuntu-18:linux-doc-0:4.15.0-246.257.all",
          "Ubuntu-18:linux-cloud-tools-lowlatency-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-57948"
        }
      ],
      "release_date": "2025-01-31T00:00:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-image-generic-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-tools-4.15.0-246-tuxcare.els34-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-generic-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-modules-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-headers-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-tools-host-0:4.15.0-246.257.all",
            "Ubuntu-18:linux-doc-0:4.15.0-246.257.all",
            "Ubuntu-18:linux-cloud-tools-lowlatency-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Medium"
        }
      ]
    },
    {
      "cve": "CVE-2024-58055",
      "cwe": {
        "id": "CWE-415",
        "name": "Double Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_tcm: Don't free command immediately\n\nDon't prematurely free the command. Wait for the status completion of\nthe sense status. It can be freed then. Otherwise we will double-free\nthe command.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-image-generic-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-tools-4.15.0-246-tuxcare.els34-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-generic-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-modules-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-headers-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-tools-host-0:4.15.0-246.257.all",
          "Ubuntu-18:linux-doc-0:4.15.0-246.257.all",
          "Ubuntu-18:linux-cloud-tools-lowlatency-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-58055"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/16907219ad6763f401700e1b57b2da4f3e07f047",
          "url": "https://git.kernel.org/stable/c/16907219ad6763f401700e1b57b2da4f3e07f047"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/38229c35a6d7875697dfb293356407330cfcd23e",
          "url": "https://git.kernel.org/stable/c/38229c35a6d7875697dfb293356407330cfcd23e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7cb72dc08ed8da60fd6d1f6adf13bf0e6ee0f694",
          "url": "https://git.kernel.org/stable/c/7cb72dc08ed8da60fd6d1f6adf13bf0e6ee0f694"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/929b69810eec132b284ffd19047a85d961df9e4d",
          "url": "https://git.kernel.org/stable/c/929b69810eec132b284ffd19047a85d961df9e4d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bbb7f49839b57d66ccaf7b5752d9b63d3031dd0a",
          "url": "https://git.kernel.org/stable/c/bbb7f49839b57d66ccaf7b5752d9b63d3031dd0a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c225d006a31949d673e646d585d9569bc28feeb9",
          "url": "https://git.kernel.org/stable/c/c225d006a31949d673e646d585d9569bc28feeb9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e6693595bd1b55af62d057a4136a89d5c2ddf0e9",
          "url": "https://git.kernel.org/stable/c/e6693595bd1b55af62d057a4136a89d5c2ddf0e9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f0c33e7d387ccbb6870e73a43c558fefede06614",
          "url": "https://git.kernel.org/stable/c/f0c33e7d387ccbb6870e73a43c558fefede06614"
        }
      ],
      "release_date": "2025-03-06T16:15:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-image-generic-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-tools-4.15.0-246-tuxcare.els34-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-generic-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-modules-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-headers-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-tools-host-0:4.15.0-246.257.all",
            "Ubuntu-18:linux-doc-0:4.15.0-246.257.all",
            "Ubuntu-18:linux-cloud-tools-lowlatency-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2025-21735",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFC: nci: Add bounds checking in nci_hci_create_pipe()\n\nThe \"pipe\" variable is a u8 which comes from the network.  If it's more\nthan 127, then it results in memory corruption in the caller,\nnci_hci_connect_gate().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-image-generic-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-tools-4.15.0-246-tuxcare.els34-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-generic-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-modules-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-headers-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-tools-host-0:4.15.0-246.257.all",
          "Ubuntu-18:linux-doc-0:4.15.0-246.257.all",
          "Ubuntu-18:linux-cloud-tools-lowlatency-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-21735"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/10b3f947b609713e04022101f492d288a014ddfa",
          "url": "https://git.kernel.org/stable/c/10b3f947b609713e04022101f492d288a014ddfa"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/110b43ef05342d5a11284cc8b21582b698b4ef1c",
          "url": "https://git.kernel.org/stable/c/110b43ef05342d5a11284cc8b21582b698b4ef1c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/172cdfc3a5ea20289c58fb73dadc6fd4a8784a4e",
          "url": "https://git.kernel.org/stable/c/172cdfc3a5ea20289c58fb73dadc6fd4a8784a4e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2ae4bade5a64d126bd18eb66bd419005c5550218",
          "url": "https://git.kernel.org/stable/c/2ae4bade5a64d126bd18eb66bd419005c5550218"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/59c7ed20217c0939862fbf8145bc49d5b3a13f4f",
          "url": "https://git.kernel.org/stable/c/59c7ed20217c0939862fbf8145bc49d5b3a13f4f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/674e17c5933779a8bf5c15d596fdfcb5ccdebbc2",
          "url": "https://git.kernel.org/stable/c/674e17c5933779a8bf5c15d596fdfcb5ccdebbc2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bd249109d266f1d52548c46634a15b71656e0d44",
          "url": "https://git.kernel.org/stable/c/bd249109d266f1d52548c46634a15b71656e0d44"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d5a461c315e5ff92657f84d8ba50caa5abf5c22a",
          "url": "https://git.kernel.org/stable/c/d5a461c315e5ff92657f84d8ba50caa5abf5c22a"
        }
      ],
      "release_date": "2025-02-27T03:15:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-image-generic-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-tools-4.15.0-246-tuxcare.els34-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-generic-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-modules-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-headers-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-tools-host-0:4.15.0-246.257.all",
            "Ubuntu-18:linux-doc-0:4.15.0-246.257.all",
            "Ubuntu-18:linux-cloud-tools-lowlatency-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2025-21782",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\norangefs: fix a oob in orangefs_debug_write\n\nI got a syzbot report: slab-out-of-bounds Read in\norangefs_debug_write... several people suggested fixes,\nI tested Al Viro's suggestion and made this patch.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-image-generic-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-tools-4.15.0-246-tuxcare.els34-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-generic-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-modules-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-headers-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-tools-host-0:4.15.0-246.257.all",
          "Ubuntu-18:linux-doc-0:4.15.0-246.257.all",
          "Ubuntu-18:linux-cloud-tools-lowlatency-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-21782"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/09d472a18c0ee1d5b83612cb919e33a1610fea16",
          "url": "https://git.kernel.org/stable/c/09d472a18c0ee1d5b83612cb919e33a1610fea16"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/18b7f841109f697840fe8633cf7ed7d32bd3f91b",
          "url": "https://git.kernel.org/stable/c/18b7f841109f697840fe8633cf7ed7d32bd3f91b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1c5244299241cf49d8ae7b5054e299cc8faa4e09",
          "url": "https://git.kernel.org/stable/c/1c5244299241cf49d8ae7b5054e299cc8faa4e09"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1da2697307dad281dd690a19441b5ca4af92d786",
          "url": "https://git.kernel.org/stable/c/1da2697307dad281dd690a19441b5ca4af92d786"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2b84a231910cef2e0a16d29294afabfb69112087",
          "url": "https://git.kernel.org/stable/c/2b84a231910cef2e0a16d29294afabfb69112087"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8725882b0f691f8113b230aea9df0256030a63a6",
          "url": "https://git.kernel.org/stable/c/8725882b0f691f8113b230aea9df0256030a63a6"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/897f496b946fdcfab5983c983e4b513ab6682364",
          "url": "https://git.kernel.org/stable/c/897f496b946fdcfab5983c983e4b513ab6682364"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f7c848431632598ff9bce57a659db6af60d75b39",
          "url": "https://git.kernel.org/stable/c/f7c848431632598ff9bce57a659db6af60d75b39"
        }
      ],
      "release_date": "2025-02-27T03:15:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-image-generic-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-tools-4.15.0-246-tuxcare.els34-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-generic-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-modules-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-headers-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-tools-host-0:4.15.0-246.257.all",
            "Ubuntu-18:linux-doc-0:4.15.0-246.257.all",
            "Ubuntu-18:linux-cloud-tools-lowlatency-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    },
    {
      "cve": "CVE-2024-57908",
      "cwe": {
        "id": "CWE-908",
        "name": "Use of Uninitialized Resource"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niio: imu: kmx61: fix information leak in triggered buffer\n\nThe 'buffer' local array is used to push data to user space from a\ntriggered buffer, but it does not set values for inactive channels, as\nit only uses iio_for_each_active_channel() to assign new values.\n\nInitialize the array to zero before using it to avoid pushing\nuninitialized information to userspace.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-18:linux-image-generic-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-tools-4.15.0-246-tuxcare.els34-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-cloud-tools-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-generic-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-modules-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-headers-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
          "Ubuntu-18:linux-tools-host-0:4.15.0-246.257.all",
          "Ubuntu-18:linux-doc-0:4.15.0-246.257.all",
          "Ubuntu-18:linux-cloud-tools-lowlatency-0:4.15.0.246.257.amd64",
          "Ubuntu-18:linux-modules-extra-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-57908"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0871eb8d700b33dd7fa86c80630d62ddaef58c2c",
          "url": "https://git.kernel.org/stable/c/0871eb8d700b33dd7fa86c80630d62ddaef58c2c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/565814cbbaa674d2901428796801de49a611e59d",
          "url": "https://git.kernel.org/stable/c/565814cbbaa674d2901428796801de49a611e59d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6985ba4467e4b15b809043fa7740d1fb23a1897b",
          "url": "https://git.kernel.org/stable/c/6985ba4467e4b15b809043fa7740d1fb23a1897b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6ae053113f6a226a2303caa4936a4c37f3bfff7b",
          "url": "https://git.kernel.org/stable/c/6ae053113f6a226a2303caa4936a4c37f3bfff7b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a07f698084412a3ef5e950fcac1d6b0f53289efd",
          "url": "https://git.kernel.org/stable/c/a07f698084412a3ef5e950fcac1d6b0f53289efd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a386d9d2dc6635f2ec210b8199cfb3acf4d31305",
          "url": "https://git.kernel.org/stable/c/a386d9d2dc6635f2ec210b8199cfb3acf4d31305"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cde312e257b59ecaa0fad3af9ec7e2370bb24639",
          "url": "https://git.kernel.org/stable/c/cde312e257b59ecaa0fad3af9ec7e2370bb24639"
        }
      ],
      "release_date": "2025-01-19T12:15:00",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-18:linux-image-generic-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-tools-4.15.0-246-tuxcare.els34-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-cloud-tools-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-generic-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-modules-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-headers-4.15.0-246-tuxcare.els34-lowlatency-0:4.15.0-246.257.amd64",
            "Ubuntu-18:linux-tools-host-0:4.15.0-246.257.all",
            "Ubuntu-18:linux-doc-0:4.15.0-246.257.all",
            "Ubuntu-18:linux-cloud-tools-lowlatency-0:4.15.0.246.257.amd64",
            "Ubuntu-18:linux-modules-extra-4.15.0-246-tuxcare.els34-generic-0:4.15.0-246.257.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "High"
        }
      ]
    }
  ]
}