{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "* CVE-url: https://ubuntu.com/security/CVE-2022-43945\n     - NFSD: Protect against send buffer overflow in NFSv3 READ\n   * CVE-url: https://ubuntu.com/security/CVE-2025-21796\n     - nfsd: clear acl_access/acl_default after releasing them\n   * CVE-url: https://ubuntu.com/security/CVE-2022-48827\n     - NFSD: Fix the behavior of READ near OFFSET_MAX\n   * CVE-url: https://ubuntu.com/security/CVE-2025-38477\n     - net/sched: sch_qfq: Fix race condition on qfq_aggregate\n     - net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in\n       qfq_delete_class\n   * CVE-url: https://ubuntu.com/security/CVE-2025-38618\n     - vsock: Do not allow binding to VMADDR_PORT_ANY\n   * CVE-url: https://ubuntu.com/security/CVE-2025-38617\n     - net/packet: fix a race in packet_set_ring() and packet_notifier()\n   * CVE-url: https://ubuntu.com/security/CVE-2021-47391\n     - RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests\n   * CVE-url: https://ubuntu.com/security/CVE-2024-41069\n     - ASoC: topology: Fix references to freed memory\n     - ASoC: topology: Do not assign fields that are already set\n     - ASoC: topology: Clean up route loading\n   * CVE-url: https://ubuntu.com/security/CVE-2024-56616\n     - drm/dp_mst: Fix MST sideband message body length check\n   * CVE-url: https://ubuntu.com/security/CVE-2024-35932\n     - drm/vc4: don't check if plane->state->fb == state->fb\n   * CVE-url: https://ubuntu.com/security/CVE-2025-38350\n     - net/sched: Always pass notifications when child class becomes empty",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/ubuntu20.04els/advisories/2025/clsa-2025_1760645131.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2025:1760645131",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1760645131"
      }
    ],
    "tracking": {
      "current_release_date": "2025-10-16T20:08:23Z",
      "generator": {
        "date": "2025-10-16T20:08:23Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1760645131",
      "initial_release_date": "2025-10-16T20:08:23Z",
      "revision_history": [
        {
          "date": "2025-10-16T20:08:23Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "Fix of 11 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Ubuntu 20.04",
                "product": {
                  "name": "Ubuntu 20.04",
                  "product_id": "Ubuntu-20",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Ubuntu"
          }
        ],
        "category": "vendor",
        "name": "Canonical Ltd."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
                "product": {
                  "name": "linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
                  "product_id": "linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency@5.4.0-222.242?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
                "product": {
                  "name": "linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
                  "product_id": "linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-buildinfo-5.4.0-222-tuxcare.els4-generic@5.4.0-222.242?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-generic-0:5.4.0.222.242.amd64",
                "product": {
                  "name": "linux-generic-0:5.4.0.222.242.amd64",
                  "product_id": "linux-generic-0:5.4.0.222.242.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-generic@5.4.0.222.242?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-image-lowlatency-0:5.4.0.222.242.amd64",
                "product": {
                  "name": "linux-image-lowlatency-0:5.4.0.222.242.amd64",
                  "product_id": "linux-image-lowlatency-0:5.4.0.222.242.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-image-lowlatency@5.4.0.222.242?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
                "product": {
                  "name": "linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
                  "product_id": "linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency@5.4.0-222.242?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
                "product": {
                  "name": "linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
                  "product_id": "linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-tools-5.4.0-222-tuxcare.els4-lowlatency@5.4.0-222.242?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-cloud-tools-generic-0:5.4.0.222.242.amd64",
                "product": {
                  "name": "linux-cloud-tools-generic-0:5.4.0.222.242.amd64",
                  "product_id": "linux-cloud-tools-generic-0:5.4.0.222.242.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-cloud-tools-generic@5.4.0.222.242?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-headers-generic-0:5.4.0.222.242.amd64",
                "product": {
                  "name": "linux-headers-generic-0:5.4.0.222.242.amd64",
                  "product_id": "linux-headers-generic-0:5.4.0.222.242.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-headers-generic@5.4.0.222.242?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-image-generic-0:5.4.0.222.242.amd64",
                "product": {
                  "name": "linux-image-generic-0:5.4.0.222.242.amd64",
                  "product_id": "linux-image-generic-0:5.4.0.222.242.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-image-generic@5.4.0.222.242?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
                "product": {
                  "name": "linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
                  "product_id": "linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-headers-5.4.0-222-tuxcare.els4-lowlatency@5.4.0-222.242?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-generic-0:5.4.0.222.242.amd64",
                "product": {
                  "name": "linux-tools-generic-0:5.4.0.222.242.amd64",
                  "product_id": "linux-tools-generic-0:5.4.0.222.242.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-tools-generic@5.4.0.222.242?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
                "product": {
                  "name": "linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
                  "product_id": "linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-cloud-tools-5.4.0-222-tuxcare.els4-generic@5.4.0-222.242?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-lowlatency-0:5.4.0.222.242.amd64",
                "product": {
                  "name": "linux-tools-lowlatency-0:5.4.0.222.242.amd64",
                  "product_id": "linux-tools-lowlatency-0:5.4.0.222.242.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-tools-lowlatency@5.4.0.222.242?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
                "product": {
                  "name": "linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
                  "product_id": "linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-headers-5.4.0-222-tuxcare.els4-generic@5.4.0-222.242?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
                "product": {
                  "name": "linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
                  "product_id": "linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-modules-5.4.0-222-tuxcare.els4-generic@5.4.0-222.242?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
                "product": {
                  "name": "linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
                  "product_id": "linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-tools-5.4.0-222-tuxcare.els4@5.4.0-222.242?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-lowlatency-0:5.4.0.222.242.amd64",
                "product": {
                  "name": "linux-lowlatency-0:5.4.0.222.242.amd64",
                  "product_id": "linux-lowlatency-0:5.4.0.222.242.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-lowlatency@5.4.0.222.242?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-libc-dev-0:5.4.0-222.242.amd64",
                "product": {
                  "name": "linux-libc-dev-0:5.4.0-222.242.amd64",
                  "product_id": "linux-libc-dev-0:5.4.0-222.242.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-libc-dev@5.4.0-222.242?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64",
                "product": {
                  "name": "linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64",
                  "product_id": "linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-cloud-tools-lowlatency@5.4.0.222.242?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
                "product": {
                  "name": "linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
                  "product_id": "linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency@5.4.0-222.242?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
                "product": {
                  "name": "linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
                  "product_id": "linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-cloud-tools-5.4.0-222-tuxcare.els4@5.4.0-222.242?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
                "product": {
                  "name": "linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
                  "product_id": "linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-tools-5.4.0-222-tuxcare.els4-generic@5.4.0-222.242?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-headers-lowlatency-0:5.4.0.222.242.amd64",
                "product": {
                  "name": "linux-headers-lowlatency-0:5.4.0.222.242.amd64",
                  "product_id": "linux-headers-lowlatency-0:5.4.0.222.242.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-headers-lowlatency@5.4.0.222.242?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
                "product": {
                  "name": "linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
                  "product_id": "linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-modules-extra-5.4.0-222-tuxcare.els4-generic@5.4.0-222.242?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
                "product": {
                  "name": "linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
                  "product_id": "linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-modules-5.4.0-222-tuxcare.els4-lowlatency@5.4.0-222.242?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
                "product": {
                  "name": "linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
                  "product_id": "linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-image-unsigned-5.4.0-222-tuxcare.els4-generic@5.4.0-222.242?arch=amd64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "linux-cloud-tools-common-0:5.4.0-222.242.all",
                "product": {
                  "name": "linux-cloud-tools-common-0:5.4.0-222.242.all",
                  "product_id": "linux-cloud-tools-common-0:5.4.0-222.242.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-cloud-tools-common@5.4.0-222.242?arch=all"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all",
                "product": {
                  "name": "linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all",
                  "product_id": "linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-headers-5.4.0-222-tuxcare.els4@5.4.0-222.242?arch=all"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-source-5.4.0-0:5.4.0-222.242.all",
                "product": {
                  "name": "linux-source-5.4.0-0:5.4.0-222.242.all",
                  "product_id": "linux-source-5.4.0-0:5.4.0-222.242.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-source-5.4.0@5.4.0-222.242?arch=all"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-common-0:5.4.0-222.242.all",
                "product": {
                  "name": "linux-tools-common-0:5.4.0-222.242.all",
                  "product_id": "linux-tools-common-0:5.4.0-222.242.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-tools-common@5.4.0-222.242?arch=all"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-host-0:5.4.0-222.242.all",
                "product": {
                  "name": "linux-tools-host-0:5.4.0-222.242.all",
                  "product_id": "linux-tools-host-0:5.4.0-222.242.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-tools-host@5.4.0-222.242?arch=all"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-doc-0:5.4.0-222.242.all",
                "product": {
                  "name": "linux-doc-0:5.4.0-222.242.all",
                  "product_id": "linux-doc-0:5.4.0-222.242.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-doc@5.4.0-222.242?arch=all"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "all"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64"
        },
        "product_reference": "linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64"
        },
        "product_reference": "linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-generic-0:5.4.0.222.242.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-generic-0:5.4.0.222.242.amd64"
        },
        "product_reference": "linux-generic-0:5.4.0.222.242.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-image-lowlatency-0:5.4.0.222.242.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-image-lowlatency-0:5.4.0.222.242.amd64"
        },
        "product_reference": "linux-image-lowlatency-0:5.4.0.222.242.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64"
        },
        "product_reference": "linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-cloud-tools-common-0:5.4.0-222.242.all as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-222.242.all"
        },
        "product_reference": "linux-cloud-tools-common-0:5.4.0-222.242.all",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64"
        },
        "product_reference": "linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-cloud-tools-generic-0:5.4.0.222.242.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-cloud-tools-generic-0:5.4.0.222.242.amd64"
        },
        "product_reference": "linux-cloud-tools-generic-0:5.4.0.222.242.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-headers-generic-0:5.4.0.222.242.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-headers-generic-0:5.4.0.222.242.amd64"
        },
        "product_reference": "linux-headers-generic-0:5.4.0.222.242.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-image-generic-0:5.4.0.222.242.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-image-generic-0:5.4.0.222.242.amd64"
        },
        "product_reference": "linux-image-generic-0:5.4.0.222.242.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64"
        },
        "product_reference": "linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-generic-0:5.4.0.222.242.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-tools-generic-0:5.4.0.222.242.amd64"
        },
        "product_reference": "linux-tools-generic-0:5.4.0.222.242.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64"
        },
        "product_reference": "linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-lowlatency-0:5.4.0.222.242.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-tools-lowlatency-0:5.4.0.222.242.amd64"
        },
        "product_reference": "linux-tools-lowlatency-0:5.4.0.222.242.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64"
        },
        "product_reference": "linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64"
        },
        "product_reference": "linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64"
        },
        "product_reference": "linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all"
        },
        "product_reference": "linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-source-5.4.0-0:5.4.0-222.242.all as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-source-5.4.0-0:5.4.0-222.242.all"
        },
        "product_reference": "linux-source-5.4.0-0:5.4.0-222.242.all",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-lowlatency-0:5.4.0.222.242.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-lowlatency-0:5.4.0.222.242.amd64"
        },
        "product_reference": "linux-lowlatency-0:5.4.0.222.242.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-libc-dev-0:5.4.0-222.242.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-libc-dev-0:5.4.0-222.242.amd64"
        },
        "product_reference": "linux-libc-dev-0:5.4.0-222.242.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-common-0:5.4.0-222.242.all as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-tools-common-0:5.4.0-222.242.all"
        },
        "product_reference": "linux-tools-common-0:5.4.0-222.242.all",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64"
        },
        "product_reference": "linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64"
        },
        "product_reference": "linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64"
        },
        "product_reference": "linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-host-0:5.4.0-222.242.all as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-tools-host-0:5.4.0-222.242.all"
        },
        "product_reference": "linux-tools-host-0:5.4.0-222.242.all",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64"
        },
        "product_reference": "linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-headers-lowlatency-0:5.4.0.222.242.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-headers-lowlatency-0:5.4.0.222.242.amd64"
        },
        "product_reference": "linux-headers-lowlatency-0:5.4.0.222.242.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64"
        },
        "product_reference": "linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-doc-0:5.4.0-222.242.all as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-doc-0:5.4.0-222.242.all"
        },
        "product_reference": "linux-doc-0:5.4.0-222.242.all",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64"
        },
        "product_reference": "linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64"
        },
        "product_reference": "linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-21796",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nnfsd: clear acl_access/acl_default after releasing them\nIf getting acl_default fails, acl_access and acl_default will be released\nsimultaneously. However, acl_access will still retain a pointer pointing\nto the released posix_acl, which will trigger a WARNING in\nnfs3svc_release_getacl like this:\n------------[ cut here ]------------\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 26 PID: 3199 at lib/refcount.c:28\nrefcount_warn_saturate+0xb5/0x170\nModules linked in:\nCPU: 26 UID: 0 PID: 3199 Comm: nfsd Not tainted\n6.12.0-rc6-00079-g04ae226af01f-dirty #8\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.16.1-2.fc37 04/01/2014\nRIP: 0010:refcount_warn_saturate+0xb5/0x170\nCode: cc cc 0f b6 1d b3 20 a5 03 80 fb 01 0f 87 65 48 d8 00 83 e3 01 75\ne4 48 c7 c7 c0 3b 9b 85 c6 05 97 20 a5 03 01 e8 fb 3e 30 ff <0f> 0b eb\ncd 0f b6 1d 8a3\nRSP: 0018:ffffc90008637cd8 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff83904fde\nRDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffff88871ed36380\nRBP: ffff888158beeb40 R08: 0000000000000001 R09: fffff520010c6f56\nR10: ffffc90008637ab7 R11: 0000000000000001 R12: 0000000000000001\nR13: ffff888140e77400 R14: ffff888140e77408 R15: ffffffff858b42c0\nFS:  0000000000000000(0000) GS:ffff88871ed00000(0000)\nknlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000562384d32158 CR3: 000000055cc6a000 CR4: 00000000000006f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n<TASK>\n? refcount_warn_saturate+0xb5/0x170\n? __warn+0xa5/0x140\n? refcount_warn_saturate+0xb5/0x170\n? report_bug+0x1b1/0x1e0\n? handle_bug+0x53/0xa0\n? exc_invalid_op+0x17/0x40\n? asm_exc_invalid_op+0x1a/0x20\n? tick_nohz_tick_stopped+0x1e/0x40\n? refcount_warn_saturate+0xb5/0x170\n? refcount_warn_saturate+0xb5/0x170\nnfs3svc_release_getacl+0xc9/0xe0\nsvc_process_common+0x5db/0xb60\n? __pfx_svc_process_common+0x10/0x10\n? __rcu_read_unlock+0x69/0xa0\n? __pfx_nfsd_dispatch+0x10/0x10\n? svc_xprt_received+0xa1/0x120\n? xdr_init_decode+0x11d/0x190\nsvc_process+0x2a7/0x330\nsvc_handle_xprt+0x69d/0x940\nsvc_recv+0x180/0x2d0\nnfsd+0x168/0x200\n? __pfx_nfsd+0x10/0x10\nkthread+0x1a2/0x1e0\n? kthread+0xf4/0x1e0\n? __pfx_kthread+0x10/0x10\nret_from_fork+0x34/0x60\n? __pfx_kthread+0x10/0x10\nret_from_fork_asm+0x1a/0x30\n</TASK>\nKernel panic - not syncing: kernel: panic_on_warn set ...\nClear acl_access/acl_default after posix_acl_release is called to prevent\nUAF from being triggered.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-cloud-tools-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-doc-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-headers-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-headers-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-libc-dev-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-source-5.4.0-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-common-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-tools-host-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-lowlatency-0:5.4.0.222.242.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-21796"
        }
      ],
      "release_date": "2025-02-27T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-cloud-tools-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-doc-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-headers-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-headers-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-tools-host-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-lowlatency-0:5.4.0.222.242.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2025-38618",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nvsock: Do not allow binding to VMADDR_PORT_ANY\nIt is possible for a vsock to autobind to VMADDR_PORT_ANY. This can\ncause a use-after-free when a connection is made to the bound socket.\nThe socket returned by accept() also has port VMADDR_PORT_ANY but is not\non the list of unbound sockets. Binding it will result in an extra\nrefcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep\nthe binding until socket destruction).\nModify the check in __vsock_bind_connectible() to also prevent binding\nto VMADDR_PORT_ANY.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-cloud-tools-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-doc-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-headers-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-headers-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-libc-dev-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-source-5.4.0-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-common-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-tools-host-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-lowlatency-0:5.4.0.222.242.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38618"
        }
      ],
      "release_date": "2025-08-22T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-cloud-tools-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-doc-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-headers-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-headers-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-tools-host-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-lowlatency-0:5.4.0.222.242.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2025-38617",
      "cwe": {
        "id": "CWE-366",
        "name": "Race Condition within a Thread"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nnet/packet: fix a race in packet_set_ring() and packet_notifier()\nWhen packet_set_ring() releases po->bind_lock, another thread can\nrun packet_notifier() and process an NETDEV_UP event.\nThis race and the fix are both similar to that of commit 15fe076edea7\n(\"net/packet: fix a race in packet_bind() and packet_notifier()\").\nThere too the packet_notifier NETDEV_UP event managed to run while a\npo->bind_lock critical section had to be temporarily released. And\nthe fix was similarly to temporarily set po->num to zero to keep\nthe socket unhooked until the lock is retaken.\nThe po->bind_lock in packet_set_ring and packet_notifier precede the\nintroduction of git history.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-cloud-tools-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-doc-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-headers-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-headers-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-libc-dev-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-source-5.4.0-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-common-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-tools-host-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-lowlatency-0:5.4.0.222.242.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38617"
        }
      ],
      "release_date": "2025-08-22T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 4.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-cloud-tools-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-doc-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-headers-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-headers-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-tools-host-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-lowlatency-0:5.4.0.222.242.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2025-38477",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nnet/sched: sch_qfq: Fix race condition on qfq_aggregate\nA race condition can occur when 'agg' is modified in qfq_change_agg\n(called during qfq_enqueue) while other threads access it\nconcurrently. For example, qfq_dump_class may trigger a NULL\ndereference, and qfq_delete_class may cause a use-after-free.\nThis patch addresses the issue by:\n1. Moved qfq_destroy_class into the critical section.\n2. Added sch_tree_lock protection to qfq_dump_class and\nqfq_dump_class_stats.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-cloud-tools-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-doc-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-headers-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-headers-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-libc-dev-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-source-5.4.0-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-common-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-tools-host-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-lowlatency-0:5.4.0.222.242.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38477"
        }
      ],
      "release_date": "2025-07-28T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-cloud-tools-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-doc-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-headers-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-headers-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-tools-host-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-lowlatency-0:5.4.0.222.242.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38350",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nnet/sched: Always pass notifications when child class becomes empty\nCertain classful qdiscs may invoke their classes' dequeue handler on an\nenqueue operation. This may unexpectedly empty the child qdisc and thus\nmake an in-flight class passive via qlen_notify(). Most qdiscs do not\nexpect such behaviour at this point in time and may re-activate the\nclass eventually anyways which will lead to a use-after-free.\nThe referenced fix commit attempted to fix this behavior for the HFSC\ncase by moving the backlog accounting around, though this turned out to\nbe incomplete since the parent's parent may run into the issue too.\nThe following reproducer demonstrates this use-after-free:\ntc qdisc add dev lo root handle 1: drr\ntc filter add dev lo parent 1: basic classid 1:1\ntc class add dev lo parent 1: classid 1:1 drr\ntc qdisc add dev lo parent 1:1 handle 2: hfsc def 1\ntc class add dev lo parent 2: classid 2:1 hfsc rt m1 8 d 1 m2 0\ntc qdisc add dev lo parent 2:1 handle 3: netem\ntc qdisc add dev lo parent 3:1 handle 4: blackhole\necho 1 | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888\ntc class delete dev lo classid 1:1\necho 1 | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888\nSince backlog accounting issues leading to a use-after-frees on stale\nclass pointers is a recurring pattern at this point, this patch takes\na different approach. Instead of trying to fix the accounting, the patch\nensures that qdisc_tree_reduce_backlog always calls qlen_notify when\nthe child qdisc is empty. This solves the problem because deletion of\nqdiscs always involves a call to qdisc_reset() and / or\nqdisc_purge_queue() which ultimately resets its qlen to 0 thus causing\nthe following qdisc_tree_reduce_backlog() to report to the parent. Note\nthat this may call qlen_notify on passive classes multiple times. This\nis not a problem after the recent patch series that made all the\nclassful qdiscs qlen_notify() handlers idempotent.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-cloud-tools-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-doc-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-headers-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-headers-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-libc-dev-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-source-5.4.0-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-common-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-tools-host-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-lowlatency-0:5.4.0.222.242.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38350"
        }
      ],
      "release_date": "2025-07-19T00:00:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-cloud-tools-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-doc-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-headers-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-headers-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-tools-host-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-lowlatency-0:5.4.0.222.242.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-56616",
      "cwe": {
        "id": "CWE-129",
        "name": "Improper Validation of Array Index"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/dp_mst: Fix MST sideband message body length check\n\nFix the MST sideband message body length check, which must be at least 1\nbyte accounting for the message body CRC (aka message data CRC) at the\nend of the message.\n\nThis fixes a case where an MST branch device returns a header with a\ncorrect header CRC (indicating a correctly received body length), with\nthe body length being incorrectly set to 0. This will later lead to a\nmemory corruption in drm_dp_sideband_append_payload() and the following\nerrors in dmesg:\n\n   UBSAN: array-index-out-of-bounds in drivers/gpu/drm/display/drm_dp_mst_topology.c:786:25\n   index -1 is out of range for type 'u8 [48]'\n   Call Trace:\n    drm_dp_sideband_append_payload+0x33d/0x350 [drm_display_helper]\n    drm_dp_get_one_sb_msg+0x3ce/0x5f0 [drm_display_helper]\n    drm_dp_mst_hpd_irq_handle_event+0xc8/0x1580 [drm_display_helper]\n\n   memcpy: detected field-spanning write (size 18446744073709551615) of single field \"&msg->msg[msg->curlen]\" at drivers/gpu/drm/display/drm_dp_mst_topology.c:791 (size 256)\n   Call Trace:\n    drm_dp_sideband_append_payload+0x324/0x350 [drm_display_helper]\n    drm_dp_get_one_sb_msg+0x3ce/0x5f0 [drm_display_helper]\n    drm_dp_mst_hpd_irq_handle_event+0xc8/0x1580 [drm_display_helper]",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-cloud-tools-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-doc-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-headers-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-headers-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-libc-dev-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-source-5.4.0-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-common-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-tools-host-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-lowlatency-0:5.4.0.222.242.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-56616"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/109f91d8b9335b0f3714ef9920eae5a8b21d56af",
          "url": "https://git.kernel.org/stable/c/109f91d8b9335b0f3714ef9920eae5a8b21d56af"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1fc1f32c4a3421b9d803f18ec3ef49db2fb5d5ef",
          "url": "https://git.kernel.org/stable/c/1fc1f32c4a3421b9d803f18ec3ef49db2fb5d5ef"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/70e7166612f4e6da8d7d0305c47c465d88d037e5",
          "url": "https://git.kernel.org/stable/c/70e7166612f4e6da8d7d0305c47c465d88d037e5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/780fa184d4dc38ad6c4fded345ab8f9be7a63e96",
          "url": "https://git.kernel.org/stable/c/780fa184d4dc38ad6c4fded345ab8f9be7a63e96"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/bd2fccac61b40eaf08d9546acc9fef958bfe4763",
          "url": "https://git.kernel.org/stable/c/bd2fccac61b40eaf08d9546acc9fef958bfe4763"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c58947a8d4a500902597ee1dbadf0518d7ff8801",
          "url": "https://git.kernel.org/stable/c/c58947a8d4a500902597ee1dbadf0518d7ff8801"
        }
      ],
      "release_date": "2024-12-27T15:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-cloud-tools-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-doc-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-headers-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-headers-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-tools-host-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-lowlatency-0:5.4.0.222.242.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-41069",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: topology: Fix references to freed memory\n\nMost users after parsing a topology file, release memory used by it, so\nhaving pointer references directly into topology file contents is wrong.\nUse devm_kmemdup(), to allocate memory as needed.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-cloud-tools-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-doc-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-headers-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-headers-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-libc-dev-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-source-5.4.0-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-common-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-tools-host-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-lowlatency-0:5.4.0.222.242.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-41069"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/97ab304ecd95c0b1703ff8c8c3956dc6e2afe8e1",
          "url": "https://git.kernel.org/stable/c/97ab304ecd95c0b1703ff8c8c3956dc6e2afe8e1"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ab5a6208b4d6872b1c6ecea1867940fc668cc76d",
          "url": "https://git.kernel.org/stable/c/ab5a6208b4d6872b1c6ecea1867940fc668cc76d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/b188d7f3dfab10e332e3c1066e18857964a520d2",
          "url": "https://git.kernel.org/stable/c/b188d7f3dfab10e332e3c1066e18857964a520d2"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/ccae5c6a1fab9494c86b7856faf05e296c617702",
          "url": "https://git.kernel.org/stable/c/ccae5c6a1fab9494c86b7856faf05e296c617702"
        }
      ],
      "release_date": "2024-07-29T15:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-cloud-tools-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-doc-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-headers-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-headers-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-tools-host-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-lowlatency-0:5.4.0.222.242.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-35932",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vc4: don't check if plane->state->fb == state->fb\n\nCurrently, when using non-blocking commits, we can see the following\nkernel warning:\n\n[  110.908514] ------------[ cut here ]------------\n[  110.908529] refcount_t: underflow; use-after-free.\n[  110.908620] WARNING: CPU: 0 PID: 1866 at lib/refcount.c:87 refcount_dec_not_one+0xb8/0xc0\n[  110.908664] Modules linked in: rfcomm snd_seq_dummy snd_hrtimer snd_seq snd_seq_device cmac algif_hash aes_arm64 aes_generic algif_skcipher af_alg bnep hid_logitech_hidpp vc4 brcmfmac hci_uart btbcm brcmutil bluetooth snd_soc_hdmi_codec cfg80211 cec drm_display_helper drm_dma_helper drm_kms_helper snd_soc_core snd_compress snd_pcm_dmaengine fb_sys_fops sysimgblt syscopyarea sysfillrect raspberrypi_hwmon ecdh_generic ecc rfkill libaes i2c_bcm2835 binfmt_misc joydev snd_bcm2835(C) bcm2835_codec(C) bcm2835_isp(C) v4l2_mem2mem videobuf2_dma_contig snd_pcm bcm2835_v4l2(C) raspberrypi_gpiomem bcm2835_mmal_vchiq(C) videobuf2_v4l2 snd_timer videobuf2_vmalloc videobuf2_memops videobuf2_common snd videodev vc_sm_cma(C) mc hid_logitech_dj uio_pdrv_genirq uio i2c_dev drm fuse dm_mod drm_panel_orientation_quirks backlight ip_tables x_tables ipv6\n[  110.909086] CPU: 0 PID: 1866 Comm: kodi.bin Tainted: G         C         6.1.66-v8+ #32\n[  110.909104] Hardware name: Raspberry Pi 3 Model B Rev 1.2 (DT)\n[  110.909114] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[  110.909132] pc : refcount_dec_not_one+0xb8/0xc0\n[  110.909152] lr : refcount_dec_not_one+0xb4/0xc0\n[  110.909170] sp : ffffffc00913b9c0\n[  110.909177] x29: ffffffc00913b9c0 x28: 000000556969bbb0 x27: 000000556990df60\n[  110.909205] x26: 0000000000000002 x25: 0000000000000004 x24: ffffff8004448480\n[  110.909230] x23: ffffff800570b500 x22: ffffff802e03a7bc x21: ffffffecfca68c78\n[  110.909257] x20: ffffff8002b42000 x19: ffffff802e03a600 x18: 0000000000000000\n[  110.909283] x17: 0000000000000011 x16: ffffffffffffffff x15: 0000000000000004\n[  110.909308] x14: 0000000000000fff x13: ffffffed577e47e0 x12: 0000000000000003\n[  110.909333] x11: 0000000000000000 x10: 0000000000000027 x9 : c912d0d083728c00\n[  110.909359] x8 : c912d0d083728c00 x7 : 65646e75203a745f x6 : 746e756f63666572\n[  110.909384] x5 : ffffffed579f62ee x4 : ffffffed579eb01e x3 : 0000000000000000\n[  110.909409] x2 : 0000000000000000 x1 : ffffffc00913b750 x0 : 0000000000000001\n[  110.909434] Call trace:\n[  110.909441]  refcount_dec_not_one+0xb8/0xc0\n[  110.909461]  vc4_bo_dec_usecnt+0x4c/0x1b0 [vc4]\n[  110.909903]  vc4_cleanup_fb+0x44/0x50 [vc4]\n[  110.910315]  drm_atomic_helper_cleanup_planes+0x88/0xa4 [drm_kms_helper]\n[  110.910669]  vc4_atomic_commit_tail+0x390/0x9dc [vc4]\n[  110.911079]  commit_tail+0xb0/0x164 [drm_kms_helper]\n[  110.911397]  drm_atomic_helper_commit+0x1d0/0x1f0 [drm_kms_helper]\n[  110.911716]  drm_atomic_commit+0xb0/0xdc [drm]\n[  110.912569]  drm_mode_atomic_ioctl+0x348/0x4b8 [drm]\n[  110.913330]  drm_ioctl_kernel+0xec/0x15c [drm]\n[  110.914091]  drm_ioctl+0x24c/0x3b0 [drm]\n[  110.914850]  __arm64_sys_ioctl+0x9c/0xd4\n[  110.914873]  invoke_syscall+0x4c/0x114\n[  110.914897]  el0_svc_common+0xd0/0x118\n[  110.914917]  do_el0_svc+0x38/0xd0\n[  110.914936]  el0_svc+0x30/0x8c\n[  110.914958]  el0t_64_sync_handler+0x84/0xf0\n[  110.914979]  el0t_64_sync+0x18c/0x190\n[  110.914996] ---[ end trace 0000000000000000 ]---\n\nThis happens because, although `prepare_fb` and `cleanup_fb` are\nperfectly balanced, we cannot guarantee consistency in the check\nplane->state->fb == state->fb. This means that sometimes we can increase\nthe refcount in `prepare_fb` and don't decrease it in `cleanup_fb`. The\nopposite can also be true.\n\nIn fact, the struct drm_plane .state shouldn't be accessed directly\nbut instead, the `drm_atomic_get_new_plane_state()` helper function should\nbe used. So, we could stick to this check, but using\n`drm_atomic_get_new_plane_state()`. But actually, this check is not re\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-cloud-tools-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-doc-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-headers-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-headers-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-libc-dev-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-source-5.4.0-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-common-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-tools-host-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-lowlatency-0:5.4.0.222.242.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-35932"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/48bfb4b03c5ff6e1fa1dc73fb915e150b0968c40",
          "url": "https://git.kernel.org/stable/c/48bfb4b03c5ff6e1fa1dc73fb915e150b0968c40"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5343f724c912c77541029123f47ecd3d2ea63bdd",
          "url": "https://git.kernel.org/stable/c/5343f724c912c77541029123f47ecd3d2ea63bdd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5ee0d47dcf33efd8950b347dcf4d20bab12a3fa9",
          "url": "https://git.kernel.org/stable/c/5ee0d47dcf33efd8950b347dcf4d20bab12a3fa9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d6b2fe2db1d0927b2d7df5c763eba55d0e1def3c",
          "url": "https://git.kernel.org/stable/c/d6b2fe2db1d0927b2d7df5c763eba55d0e1def3c"
        }
      ],
      "release_date": "2024-05-19T11:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-cloud-tools-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-doc-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-headers-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-headers-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-tools-host-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-lowlatency-0:5.4.0.222.242.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-48827",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: Fix the behavior of READ near OFFSET_MAX\n\nDan Aloni reports:\n> Due to commit 8cfb9015280d (\"NFS: Always provide aligned buffers to\n> the RPC read layers\") on the client, a read of 0xfff is aligned up\n> to server rsize of 0x1000.\n>\n> As a result, in a test where the server has a file of size\n> 0x7fffffffffffffff, and the client tries to read from the offset\n> 0x7ffffffffffff000, the read causes loff_t overflow in the server\n> and it returns an NFS code of EINVAL to the client. The client as\n> a result indefinitely retries the request.\n\nThe Linux NFS client does not handle NFS?ERR_INVAL, even though all\nNFS specifications permit servers to return that status code for a\nREAD.\n\nInstead of NFS?ERR_INVAL, have out-of-range READ requests succeed\nand return a short result. Set the EOF flag in the result to prevent\nthe client from retrying the READ request. This behavior appears to\nbe consistent with Solaris NFS servers.\n\nNote that NFSv3 and NFSv4 use u64 offset values on the wire. These\nmust be converted to loff_t internally before use -- an implicit\ntype cast is not adequate for this purpose. Otherwise VFS checks\nagainst sb->s_maxbytes do not work properly.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-cloud-tools-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-doc-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-headers-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-headers-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-libc-dev-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-source-5.4.0-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-common-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-tools-host-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-lowlatency-0:5.4.0.222.242.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-48827"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0cb4d23ae08c48f6bf3c29a8e5c4a74b8388b960",
          "url": "https://git.kernel.org/stable/c/0cb4d23ae08c48f6bf3c29a8e5c4a74b8388b960"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1726a39b0879acfb490b22dca643f26f4f907da9",
          "url": "https://git.kernel.org/stable/c/1726a39b0879acfb490b22dca643f26f4f907da9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/44502aca8e02ab32d6b0eb52e006a5ec9402719b",
          "url": "https://git.kernel.org/stable/c/44502aca8e02ab32d6b0eb52e006a5ec9402719b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c6eff5c4277146a78b4fb8c9b668dd64542c41b0",
          "url": "https://git.kernel.org/stable/c/c6eff5c4277146a78b4fb8c9b668dd64542c41b0"
        }
      ],
      "release_date": "2024-07-16T12:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-cloud-tools-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-doc-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-headers-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-headers-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-tools-host-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-lowlatency-0:5.4.0.222.242.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2022-43945",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "notes": [
        {
          "category": "description",
          "text": "The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-cloud-tools-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-doc-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-headers-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-headers-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-libc-dev-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-source-5.4.0-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-common-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-tools-host-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-lowlatency-0:5.4.0.222.242.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2022-43945"
        },
        {
          "category": "external",
          "summary": "http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html",
          "url": "http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8",
          "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20221215-0006/",
          "url": "https://security.netapp.com/advisory/ntap-20221215-0006/"
        }
      ],
      "release_date": "2022-11-04T19:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-cloud-tools-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-doc-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-headers-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-headers-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-tools-host-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-lowlatency-0:5.4.0.222.242.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2021-47391",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests\n\nThe FSM can run in a circle allowing rdma_resolve_ip() to be called twice\non the same id_priv. While this cannot happen without going through the\nwork, it violates the invariant that the same address resolution\nbackground request cannot be active twice.\n\n       CPU 1                                  CPU 2\n\nrdma_resolve_addr():\n  RDMA_CM_IDLE -> RDMA_CM_ADDR_QUERY\n  rdma_resolve_ip(addr_handler)  #1\n\n\t\t\t process_one_req(): for #1\n                          addr_handler():\n                            RDMA_CM_ADDR_QUERY -> RDMA_CM_ADDR_BOUND\n                            mutex_unlock(&id_priv->handler_mutex);\n                            [.. handler still running ..]\n\nrdma_resolve_addr():\n  RDMA_CM_ADDR_BOUND -> RDMA_CM_ADDR_QUERY\n  rdma_resolve_ip(addr_handler)\n    !! two requests are now on the req_list\n\nrdma_destroy_id():\n destroy_id_handler_unlock():\n  _destroy_id():\n   cma_cancel_operation():\n    rdma_addr_cancel()\n\n                          // process_one_req() self removes it\n\t\t          spin_lock_bh(&lock);\n                           cancel_delayed_work(&req->work);\n\t                   if (!list_empty(&req->list)) == true\n\n      ! rdma_addr_cancel() returns after process_on_req #1 is done\n\n   kfree(id_priv)\n\n\t\t\t process_one_req(): for #2\n                          addr_handler():\n\t                    mutex_lock(&id_priv->handler_mutex);\n                            !! Use after free on id_priv\n\nrdma_addr_cancel() expects there to be one req on the list and only\ncancels the first one. The self-removal behavior of the work only happens\nafter the handler has returned. This yields a situations where the\nreq_list can have two reqs for the same \"handle\" but rdma_addr_cancel()\nonly cancels the first one.\n\nThe second req remains active beyond rdma_destroy_id() and will\nuse-after-free id_priv once it inevitably triggers.\n\nFix this by remembering if the id_priv has called rdma_resolve_ip() and\nalways cancel before calling it again. This ensures the req_list never\ngets more than one item in it and doesn't cost anything in the normal flow\nthat never uses this strange error path.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-cloud-tools-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-doc-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-headers-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-headers-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-libc-dev-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-lowlatency-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-source-5.4.0-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
          "Ubuntu-20:linux-tools-common-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-generic-0:5.4.0.222.242.amd64",
          "Ubuntu-20:linux-tools-host-0:5.4.0-222.242.all",
          "Ubuntu-20:linux-tools-lowlatency-0:5.4.0.222.242.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2021-47391"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/03d884671572af8bcfbc9e63944c1021efce7589",
          "url": "https://git.kernel.org/stable/c/03d884671572af8bcfbc9e63944c1021efce7589"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/305d568b72f17f674155a2a8275f865f207b3808",
          "url": "https://git.kernel.org/stable/c/305d568b72f17f674155a2a8275f865f207b3808"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9a085fa9b7d644a234465091e038c1911e1a4f2a",
          "url": "https://git.kernel.org/stable/c/9a085fa9b7d644a234465091e038c1911e1a4f2a"
        }
      ],
      "release_date": "2024-05-21T15:15:00Z",
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-cloud-tools-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-cloud-tools-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-doc-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-headers-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-headers-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-headers-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-lowlatency-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-modules-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-generic-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-5.4.0-222-tuxcare.els4-lowlatency-0:5.4.0-222.242.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-generic-0:5.4.0.222.242.amd64",
            "Ubuntu-20:linux-tools-host-0:5.4.0-222.242.all",
            "Ubuntu-20:linux-tools-lowlatency-0:5.4.0.222.242.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}