{"id":"USN-5383-1","summary":"linux, linux-aws, linux-aws-5.13, linux-azure, linux-azure-5.13, linux-gcp, linux-gcp-5.13, linux-hwe-5.13, linux-kvm, linux-oracle, linux-oracle-5.13, linux-raspi vulnerabilities","details":"David Bouman discovered that the netfilter subsystem in the Linux kernel\ndid not properly validate passed user register indices. A local attacker\ncould use this to cause a denial of service or possibly execute arbitrary\ncode. (CVE-2022-1015)\n\nBrendan Dolan-Gavitt discovered that the Marvell WiFi-Ex USB device driver\nin the Linux kernel did not properly handle some error conditions. A\nphysically proximate attacker could use this to cause a denial of service\n(system crash). (CVE-2021-43976)\n\nWenqing Liu discovered that the f2fs file system implementation in the\nLinux kernel did not properly validate inode types while performing garbage\ncollection. An attacker could use this to construct a malicious f2fs image\nthat, when mounted and operated on, could cause a denial of service (system\ncrash). (CVE-2021-44879)\n\nIt was discovered that the UDF file system implementation in the Linux\nkernel could attempt to dereference a null pointer in some situations. An\nattacker could use this to construct a malicious UDF image that, when\nmounted and operated on, could cause a denial of service (system crash).\n(CVE-2022-0617)\n\nDavid Bouman discovered that the netfilter subsystem in the Linux kernel\ndid not initialize memory in some situations. A local attacker could use\nthis to expose sensitive information (kernel memory). (CVE-2022-1016)\n\nLyu Tao discovered that the NFS implementation in the Linux kernel did not\nproperly handle requests to open a directory on a regular file. A local\nattacker could use this to expose sensitive information (kernel memory).\n(CVE-2022-24448)\n\nIt was discovered that the VirtIO Bluetooth driver in the Linux kernel did\nnot properly deallocate memory in some error conditions. A local attacker\ncould possibly use this to cause a denial of service (memory exhaustion).\n(CVE-2022-26878)\n\nIt was discovered that the YAM AX.25 device driver in the Linux kernel did\nnot properly deallocate memory in some error conditions. A local privileged\nattacker could use this to cause a denial of service (kernel memory\nexhaustion). (CVE-2022-24959)\n","modified":"2026-02-04T04:15:17.735241Z","published":"2022-04-20T23:48:40Z","related":["UBUNTU-CVE-2021-43976","UBUNTU-CVE-2021-44879","UBUNTU-CVE-2022-0617","UBUNTU-CVE-2022-1015","UBUNTU-CVE-2022-1016","UBUNTU-CVE-2022-24448","UBUNTU-CVE-2022-24959","UBUNTU-CVE-2022-26878"],"upstream":["CVE-2021-43976","CVE-2021-44879","CVE-2022-0617","CVE-2022-1015","CVE-2022-1016","CVE-2022-24448","CVE-2022-24959","CVE-2022-26878","UBUNTU-CVE-2021-43976","UBUNTU-CVE-2021-44879","UBUNTU-CVE-2022-0617","UBUNTU-CVE-2022-1015","UBUNTU-CVE-2022-1016","UBUNTU-CVE-2022-24448","UBUNTU-CVE-2022-24959","UBUNTU-CVE-2022-26878"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5383-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-43976"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-44879"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-0617"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1015"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1016"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-24448"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-24959"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-26878"}],"affected":[{"package":{"name":"linux-aws-5.13","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-aws-5.13@5.13.0-1022.24~20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.13.0-1022.24~20.04.1"}]}],"versions":["5.13.0-1008.9~20.04.2","5.13.0-1011.12~20.04.1","5.13.0-1012.13~20.04.1","5.13.0-1014.15~20.04.1","5.13.0-1017.19~20.04.1","5.13.0-1019.21~20.04.1","5.13.0-1021.23~20.04.2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.13.0-1022.24~20.04.1","binary_name":"linux-aws-5.13-cloud-tools-5.13.0-1022"},{"binary_version":"5.13.0-1022.24~20.04.1","binary_name":"linux-aws-5.13-headers-5.13.0-1022"},{"binary_version":"5.13.0-1022.24~20.04.1","binary_name":"linux-aws-5.13-tools-5.13.0-1022"},{"binary_version":"5.13.0-1022.24~20.04.1","binary_name":"linux-buildinfo-5.13.0-1022-aws"},{"binary_version":"5.13.0-1022.24~20.04.1","binary_name":"linux-cloud-tools-5.13.0-1022-aws"},{"binary_version":"5.13.0-1022.24~20.04.1","binary_name":"linux-headers-5.13.0-1022-aws"},{"binary_version":"5.13.0-1022.24~20.04.1","binary_name":"linux-image-unsigned-5.13.0-1022-aws"},{"binary_version":"5.13.0-1022.24~20.04.1","binary_name":"linux-modules-5.13.0-1022-aws"},{"binary_version":"5.13.0-1022.24~20.04.1","binary_name":"linux-modules-extra-5.13.0-1022-aws"},{"binary_version":"5.13.0-1022.24~20.04.1","binary_name":"linux-tools-5.13.0-1022-aws"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5383-1.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-43976"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-44879"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2022-0617"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2022-1015"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-1016"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-24448"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2022-24959"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-26878"}]}}},{"package":{"name":"linux-azure-5.13","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-azure-5.13@5.13.0-1022.26~20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.13.0-1022.26~20.04.1"}]}],"versions":["5.13.0-1009.10~20.04.2","5.13.0-1012.14~20.04.1","5.13.0-1013.15~20.04.1","5.13.0-1014.16~20.04.1","5.13.0-1017.19~20.04.1","5.13.0-1021.24~20.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.13.0-1022.26~20.04.1","binary_name":"linux-azure-5.13-cloud-tools-5.13.0-1022"},{"binary_version":"5.13.0-1022.26~20.04.1","binary_name":"linux-azure-5.13-headers-5.13.0-1022"},{"binary_version":"5.13.0-1022.26~20.04.1","binary_name":"linux-azure-5.13-tools-5.13.0-1022"},{"binary_version":"5.13.0-1022.26~20.04.1","binary_name":"linux-buildinfo-5.13.0-1022-azure"},{"binary_version":"5.13.0-1022.26~20.04.1","binary_name":"linux-cloud-tools-5.13.0-1022-azure"},{"binary_version":"5.13.0-1022.26~20.04.1","binary_name":"linux-headers-5.13.0-1022-azure"},{"binary_version":"5.13.0-1022.26~20.04.1","binary_name":"linux-image-unsigned-5.13.0-1022-azure"},{"binary_version":"5.13.0-1022.26~20.04.1","binary_name":"linux-modules-5.13.0-1022-azure"},{"binary_version":"5.13.0-1022.26~20.04.1","binary_name":"linux-modules-extra-5.13.0-1022-azure"},{"binary_version":"5.13.0-1022.26~20.04.1","binary_name":"linux-tools-5.13.0-1022-azure"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5383-1.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-43976"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-44879"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2022-0617"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2022-1015"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-1016"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-24448"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2022-24959"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-26878"}]}}},{"package":{"name":"linux-gcp-5.13","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-gcp-5.13@5.13.0-1024.29~20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.13.0-1024.29~20.04.1"}]}],"versions":["5.13.0-1008.9~20.04.3","5.13.0-1012.15~20.04.1","5.13.0-1013.16~20.04.1","5.13.0-1015.18~20.04.1","5.13.0-1019.23~20.04.1","5.13.0-1021.25~20.04.1","5.13.0-1023.28~20.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.13.0-1024.29~20.04.1","binary_name":"linux-buildinfo-5.13.0-1024-gcp"},{"binary_version":"5.13.0-1024.29~20.04.1","binary_name":"linux-gcp-5.13-headers-5.13.0-1024"},{"binary_version":"5.13.0-1024.29~20.04.1","binary_name":"linux-gcp-5.13-tools-5.13.0-1024"},{"binary_version":"5.13.0-1024.29~20.04.1","binary_name":"linux-headers-5.13.0-1024-gcp"},{"binary_version":"5.13.0-1024.29~20.04.1","binary_name":"linux-image-unsigned-5.13.0-1024-gcp"},{"binary_version":"5.13.0-1024.29~20.04.1","binary_name":"linux-modules-5.13.0-1024-gcp"},{"binary_version":"5.13.0-1024.29~20.04.1","binary_name":"linux-modules-extra-5.13.0-1024-gcp"},{"binary_version":"5.13.0-1024.29~20.04.1","binary_name":"linux-tools-5.13.0-1024-gcp"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5383-1.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-43976"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-44879"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2022-0617"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2022-1015"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-1016"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-24448"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2022-24959"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-26878"}]}}},{"package":{"name":"linux-hwe-5.13","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-hwe-5.13@5.13.0-40.45~20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.13.0-40.45~20.04.1"}]}],"versions":["5.13.0-21.21~20.04.1","5.13.0-22.22~20.04.1","5.13.0-23.23~20.04.2","5.13.0-25.26~20.04.1","5.13.0-27.29~20.04.1","5.13.0-28.31~20.04.1","5.13.0-30.33~20.04.1","5.13.0-35.40~20.04.1","5.13.0-37.42~20.04.1","5.13.0-39.44~20.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"block-modules-5.13.0-40-generic-64k-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"block-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"block-modules-5.13.0-40-generic-lpae-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"crypto-modules-5.13.0-40-generic-64k-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"crypto-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"crypto-modules-5.13.0-40-generic-lpae-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"dasd-extra-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"dasd-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"fat-modules-5.13.0-40-generic-64k-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"fat-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"fat-modules-5.13.0-40-generic-lpae-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"fb-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"firewire-core-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"floppy-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"fs-core-modules-5.13.0-40-generic-64k-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"fs-core-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"fs-core-modules-5.13.0-40-generic-lpae-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"fs-secondary-modules-5.13.0-40-generic-64k-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"fs-secondary-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"fs-secondary-modules-5.13.0-40-generic-lpae-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"input-modules-5.13.0-40-generic-64k-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"input-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"input-modules-5.13.0-40-generic-lpae-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"ipmi-modules-5.13.0-40-generic-64k-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"ipmi-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"ipmi-modules-5.13.0-40-generic-lpae-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"kernel-image-5.13.0-40-generic-64k-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"kernel-image-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"kernel-image-5.13.0-40-generic-lpae-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-buildinfo-5.13.0-40-generic"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-buildinfo-5.13.0-40-generic-64k"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-buildinfo-5.13.0-40-generic-lpae"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-buildinfo-5.13.0-40-lowlatency"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-cloud-tools-5.13.0-40-generic"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-cloud-tools-5.13.0-40-lowlatency"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-headers-5.13.0-40-generic"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-headers-5.13.0-40-generic-64k"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-headers-5.13.0-40-generic-lpae"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-headers-5.13.0-40-lowlatency"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-hwe-5.13-cloud-tools-5.13.0-40"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-hwe-5.13-cloud-tools-common"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-hwe-5.13-headers-5.13.0-40"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-hwe-5.13-source-5.13.0"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-hwe-5.13-tools-5.13.0-40"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-hwe-5.13-tools-common"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-hwe-5.13-tools-host"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-hwe-5.13-udebs-generic"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-hwe-5.13-udebs-generic-64k"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-hwe-5.13-udebs-generic-lpae"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-image-5.13.0-40-generic"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-image-5.13.0-40-generic-lpae"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-image-unsigned-5.13.0-40-generic"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-image-unsigned-5.13.0-40-generic-64k"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-image-unsigned-5.13.0-40-lowlatency"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-modules-5.13.0-40-generic"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-modules-5.13.0-40-generic-64k"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-modules-5.13.0-40-generic-lpae"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-modules-5.13.0-40-lowlatency"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-modules-extra-5.13.0-40-generic"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-tools-5.13.0-40-generic"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-tools-5.13.0-40-generic-64k"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-tools-5.13.0-40-generic-lpae"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"linux-tools-5.13.0-40-lowlatency"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"md-modules-5.13.0-40-generic-64k-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"md-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"md-modules-5.13.0-40-generic-lpae-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"message-modules-5.13.0-40-generic-64k-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"message-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"mouse-modules-5.13.0-40-generic-64k-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"mouse-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"mouse-modules-5.13.0-40-generic-lpae-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"multipath-modules-5.13.0-40-generic-64k-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"multipath-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"multipath-modules-5.13.0-40-generic-lpae-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"nfs-modules-5.13.0-40-generic-64k-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"nfs-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"nfs-modules-5.13.0-40-generic-lpae-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"nic-modules-5.13.0-40-generic-64k-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"nic-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"nic-modules-5.13.0-40-generic-lpae-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"nic-pcmcia-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"nic-shared-modules-5.13.0-40-generic-64k-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"nic-shared-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"nic-shared-modules-5.13.0-40-generic-lpae-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"nic-usb-modules-5.13.0-40-generic-64k-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"nic-usb-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"nic-usb-modules-5.13.0-40-generic-lpae-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"parport-modules-5.13.0-40-generic-64k-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"parport-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"parport-modules-5.13.0-40-generic-lpae-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"pata-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"pcmcia-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"pcmcia-storage-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"plip-modules-5.13.0-40-generic-64k-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"plip-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"plip-modules-5.13.0-40-generic-lpae-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"ppp-modules-5.13.0-40-generic-64k-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"ppp-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"ppp-modules-5.13.0-40-generic-lpae-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"sata-modules-5.13.0-40-generic-64k-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"sata-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"sata-modules-5.13.0-40-generic-lpae-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"scsi-modules-5.13.0-40-generic-64k-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"scsi-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"scsi-modules-5.13.0-40-generic-lpae-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"serial-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"storage-core-modules-5.13.0-40-generic-64k-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"storage-core-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"storage-core-modules-5.13.0-40-generic-lpae-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"usb-modules-5.13.0-40-generic-64k-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"usb-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"usb-modules-5.13.0-40-generic-lpae-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"virtio-modules-5.13.0-40-generic-64k-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"virtio-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"vlan-modules-5.13.0-40-generic-64k-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"vlan-modules-5.13.0-40-generic-di"},{"binary_version":"5.13.0-40.45~20.04.1","binary_name":"vlan-modules-5.13.0-40-generic-lpae-di"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5383-1.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-43976"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-44879"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2022-0617"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2022-1015"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-1016"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-24448"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2022-24959"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-26878"}]}}},{"package":{"name":"linux-intel-5.13","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-intel-5.13@5.13.0-1011.11?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.13.0-1011.11"}]}],"versions":["5.13.0-1007.7","5.13.0-1008.8","5.13.0-1009.9","5.13.0-1010.10"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.13.0-1011.11","binary_name":"linux-buildinfo-5.13.0-1011-intel"},{"binary_version":"5.13.0-1011.11","binary_name":"linux-cloud-tools-5.13.0-1011-intel"},{"binary_version":"5.13.0-1011.11","binary_name":"linux-headers-5.13.0-1011-intel"},{"binary_version":"5.13.0-1011.11","binary_name":"linux-image-unsigned-5.13.0-1011-intel"},{"binary_version":"5.13.0-1011.11","binary_name":"linux-intel-5.13-cloud-tools-5.13.0-1011"},{"binary_version":"5.13.0-1011.11","binary_name":"linux-intel-5.13-cloud-tools-common"},{"binary_version":"5.13.0-1011.11","binary_name":"linux-intel-5.13-headers-5.13.0-1011"},{"binary_version":"5.13.0-1011.11","binary_name":"linux-intel-5.13-source-5.13.0"},{"binary_version":"5.13.0-1011.11","binary_name":"linux-intel-5.13-tools-5.13.0-1011"},{"binary_version":"5.13.0-1011.11","binary_name":"linux-intel-5.13-tools-common"},{"binary_version":"5.13.0-1011.11","binary_name":"linux-intel-5.13-tools-host"},{"binary_version":"5.13.0-1011.11","binary_name":"linux-modules-5.13.0-1011-intel"},{"binary_version":"5.13.0-1011.11","binary_name":"linux-modules-extra-5.13.0-1011-intel"},{"binary_version":"5.13.0-1011.11","binary_name":"linux-tools-5.13.0-1011-intel"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5383-1.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-43976"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-44879"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2022-0617"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2022-1015"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-1016"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-24448"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2022-24959"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-26878"}]}}},{"package":{"name":"linux-oracle-5.13","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-oracle-5.13@5.13.0-1027.32~20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.13.0-1027.32~20.04.1"}]}],"versions":["5.13.0-1011.13~20.04.2","5.13.0-1015.19~20.04.1","5.13.0-1016.20~20.04.1","5.13.0-1018.22~20.04.1","5.13.0-1021.26~20.04.1","5.13.0-1025.30~20.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.13.0-1027.32~20.04.1","binary_name":"linux-buildinfo-5.13.0-1027-oracle"},{"binary_version":"5.13.0-1027.32~20.04.1","binary_name":"linux-headers-5.13.0-1027-oracle"},{"binary_version":"5.13.0-1027.32~20.04.1","binary_name":"linux-image-unsigned-5.13.0-1027-oracle"},{"binary_version":"5.13.0-1027.32~20.04.1","binary_name":"linux-modules-5.13.0-1027-oracle"},{"binary_version":"5.13.0-1027.32~20.04.1","binary_name":"linux-modules-extra-5.13.0-1027-oracle"},{"binary_version":"5.13.0-1027.32~20.04.1","binary_name":"linux-oracle-5.13-headers-5.13.0-1027"},{"binary_version":"5.13.0-1027.32~20.04.1","binary_name":"linux-oracle-5.13-tools-5.13.0-1027"},{"binary_version":"5.13.0-1027.32~20.04.1","binary_name":"linux-tools-5.13.0-1027-oracle"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5383-1.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-43976"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-44879"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2022-0617"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2022-1015"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-1016"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-24448"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2022-24959"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-26878"}]}}}],"schema_version":"1.7.3"}