{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "* CVE-2024-56640\n     - net/smc: fix LGR and link use-after-free issue {CVE-2024-56640}\n   * CVE-2026-23209\n     - macvlan: fix error recovery in macvlan_common_newlink() {CVE-2026-23209}\n   * CVE-2026-23193\n     - scsi: target: iscsi: Fix use-after-free in\n       iscsit_dec_session_usage_count() {CVE-2026-23193}\n   * CVE-2026-23204\n     - net/sched: cls_u32: use skb_header_pointer_careful() {CVE-2026-23204}\n   * CVE-2025-38153\n     - net: usb: aqc111: fix error handling of usbnet read calls\n       {CVE-2025-38153}\n   * CVE-2024-53218\n     - f2fs: fix race in concurrent f2fs_stop_gc_thread {CVE-2024-53218}\n   * CVE-2025-38565\n     - perf/core: Exit early on perf_mmap() fail {CVE-2025-38565}\n   * CVE-2025-38051\n     - smb: client: Fix use-after-free in cifs_fill_dirent {CVE-2025-38051}\n   * Miscellaneous upstream changes\n     - PCI: endpoint: Fix configfs group removal on driver teardown\n     - net: usb: aqc111: debug info before sanitation\n     - net: add skb_header_pointer_careful() helper",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775831524",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775831524"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/ubuntu20.04els/advisories/2026/clsa-2026_1775831524.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-04-10T14:34:07Z",
      "generator": {
        "date": "2026-04-10T14:34:07Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1775831524",
      "initial_release_date": "2026-04-10T14:34:07Z",
      "revision_history": [
        {
          "date": "2026-04-10T14:34:07Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "Fix of 8 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Ubuntu 20.04",
                "product": {
                  "name": "Ubuntu 20.04",
                  "product_id": "Ubuntu-20",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Ubuntu"
          }
        ],
        "category": "vendor",
        "name": "Canonical Ltd."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "linux-source-5.4.0-0:5.4.0-227.247.all",
                "product": {
                  "name": "linux-source-5.4.0-0:5.4.0-227.247.all",
                  "product_id": "linux-source-5.4.0-0:5.4.0-227.247.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-source-5.4.0@5.4.0-227.247?arch=all"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-doc-0:5.4.0-227.247.all",
                "product": {
                  "name": "linux-doc-0:5.4.0-227.247.all",
                  "product_id": "linux-doc-0:5.4.0-227.247.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-doc@5.4.0-227.247?arch=all"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-common-0:5.4.0-227.247.all",
                "product": {
                  "name": "linux-tools-common-0:5.4.0-227.247.all",
                  "product_id": "linux-tools-common-0:5.4.0-227.247.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-tools-common@5.4.0-227.247?arch=all"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-host-0:5.4.0-227.247.all",
                "product": {
                  "name": "linux-tools-host-0:5.4.0-227.247.all",
                  "product_id": "linux-tools-host-0:5.4.0-227.247.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-tools-host@5.4.0-227.247?arch=all"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-cloud-tools-common-0:5.4.0-227.247.all",
                "product": {
                  "name": "linux-cloud-tools-common-0:5.4.0-227.247.all",
                  "product_id": "linux-cloud-tools-common-0:5.4.0-227.247.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-cloud-tools-common@5.4.0-227.247?arch=all"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
                "product": {
                  "name": "linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
                  "product_id": "linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-headers-5.4.0-227-tuxcare.els9@5.4.0-227.247?arch=all"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "all"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
                "product": {
                  "name": "linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
                  "product_id": "linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-cloud-tools-5.4.0-227-tuxcare.els9@5.4.0-227.247?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
                "product": {
                  "name": "linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
                  "product_id": "linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-image-unsigned-5.4.0-227-tuxcare.els9-generic@5.4.0-227.247?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
                "product": {
                  "name": "linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
                  "product_id": "linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency@5.4.0-227.247?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
                "product": {
                  "name": "linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
                  "product_id": "linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-modules-extra-5.4.0-227-tuxcare.els9-generic@5.4.0-227.247?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
                "product": {
                  "name": "linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
                  "product_id": "linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-headers-5.4.0-227-tuxcare.els9-lowlatency@5.4.0-227.247?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
                "product": {
                  "name": "linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
                  "product_id": "linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-cloud-tools-5.4.0-227-tuxcare.els9-generic@5.4.0-227.247?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
                "product": {
                  "name": "linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
                  "product_id": "linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-headers-5.4.0-227-tuxcare.els9-generic@5.4.0-227.247?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
                "product": {
                  "name": "linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
                  "product_id": "linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-tools-5.4.0-227-tuxcare.els9@5.4.0-227.247?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
                "product": {
                  "name": "linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
                  "product_id": "linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-tools-5.4.0-227-tuxcare.els9-generic@5.4.0-227.247?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
                "product": {
                  "name": "linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
                  "product_id": "linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-buildinfo-5.4.0-227-tuxcare.els9-generic@5.4.0-227.247?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-libc-dev-0:5.4.0-227.247.amd64",
                "product": {
                  "name": "linux-libc-dev-0:5.4.0-227.247.amd64",
                  "product_id": "linux-libc-dev-0:5.4.0-227.247.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-libc-dev@5.4.0-227.247?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
                "product": {
                  "name": "linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
                  "product_id": "linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-modules-5.4.0-227-tuxcare.els9-lowlatency@5.4.0-227.247?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
                "product": {
                  "name": "linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
                  "product_id": "linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-tools-5.4.0-227-tuxcare.els9-lowlatency@5.4.0-227.247?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
                "product": {
                  "name": "linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
                  "product_id": "linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency@5.4.0-227.247?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
                "product": {
                  "name": "linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
                  "product_id": "linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-modules-5.4.0-227-tuxcare.els9-generic@5.4.0-227.247?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
                "product": {
                  "name": "linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
                  "product_id": "linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency@5.4.0-227.247?arch=amd64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-source-5.4.0-0:5.4.0-227.247.all as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-source-5.4.0-0:5.4.0-227.247.all"
        },
        "product_reference": "linux-source-5.4.0-0:5.4.0-227.247.all",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-doc-0:5.4.0-227.247.all as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-doc-0:5.4.0-227.247.all"
        },
        "product_reference": "linux-doc-0:5.4.0-227.247.all",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64"
        },
        "product_reference": "linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64"
        },
        "product_reference": "linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-common-0:5.4.0-227.247.all as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-tools-common-0:5.4.0-227.247.all"
        },
        "product_reference": "linux-tools-common-0:5.4.0-227.247.all",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-host-0:5.4.0-227.247.all as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-tools-host-0:5.4.0-227.247.all"
        },
        "product_reference": "linux-tools-host-0:5.4.0-227.247.all",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64"
        },
        "product_reference": "linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64"
        },
        "product_reference": "linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64"
        },
        "product_reference": "linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64"
        },
        "product_reference": "linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-cloud-tools-common-0:5.4.0-227.247.all as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-227.247.all"
        },
        "product_reference": "linux-cloud-tools-common-0:5.4.0-227.247.all",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64"
        },
        "product_reference": "linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64"
        },
        "product_reference": "linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64"
        },
        "product_reference": "linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64"
        },
        "product_reference": "linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-libc-dev-0:5.4.0-227.247.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-libc-dev-0:5.4.0-227.247.amd64"
        },
        "product_reference": "linux-libc-dev-0:5.4.0-227.247.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64"
        },
        "product_reference": "linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64"
        },
        "product_reference": "linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all"
        },
        "product_reference": "linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64"
        },
        "product_reference": "linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64"
        },
        "product_reference": "linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64 as a component of Ubuntu 20.04",
          "product_id": "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64"
        },
        "product_reference": "linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
        "relates_to_product_reference": "Ubuntu-20"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-38153",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: aqc111: fix error handling of usbnet read calls\n\nSyzkaller, courtesy of syzbot, identified an error (see report [1]) in\naqc111 driver, caused by incomplete sanitation of usb read calls'\nresults. This problem is quite similar to the one fixed in commit\n920a9fa27e78 (\"net: asix: add proper error handling of usb read errors\").\n\nFor instance, usbnet_read_cmd() may read fewer than 'size' bytes,\neven if the caller expected the full amount, and aqc111_read_cmd()\nwill not check its result properly. As [1] shows, this may lead\nto MAC address in aqc111_bind() being only partly initialized,\ntriggering KMSAN warnings.\n\nFix the issue by verifying that the number of bytes read is\nas expected and not less.\n\n[1] Partial syzbot report:\nBUG: KMSAN: uninit-value in is_valid_ether_addr include/linux/etherdevice.h:208 [inline]\nBUG: KMSAN: uninit-value in usbnet_probe+0x2e57/0x4390 drivers/net/usb/usbnet.c:1830\n is_valid_ether_addr include/linux/etherdevice.h:208 [inline]\n usbnet_probe+0x2e57/0x4390 drivers/net/usb/usbnet.c:1830\n usb_probe_interface+0xd01/0x1310 drivers/usb/core/driver.c:396\n call_driver_probe drivers/base/dd.c:-1 [inline]\n really_probe+0x4d1/0xd90 drivers/base/dd.c:658\n __driver_probe_device+0x268/0x380 drivers/base/dd.c:800\n...\n\nUninit was stored to memory at:\n dev_addr_mod+0xb0/0x550 net/core/dev_addr_lists.c:582\n __dev_addr_set include/linux/netdevice.h:4874 [inline]\n eth_hw_addr_set include/linux/etherdevice.h:325 [inline]\n aqc111_bind+0x35f/0x1150 drivers/net/usb/aqc111.c:717\n usbnet_probe+0xbe6/0x4390 drivers/net/usb/usbnet.c:1772\n usb_probe_interface+0xd01/0x1310 drivers/usb/core/driver.c:396\n...\n\nUninit was stored to memory at:\n ether_addr_copy include/linux/etherdevice.h:305 [inline]\n aqc111_read_perm_mac drivers/net/usb/aqc111.c:663 [inline]\n aqc111_bind+0x794/0x1150 drivers/net/usb/aqc111.c:713\n usbnet_probe+0xbe6/0x4390 drivers/net/usb/usbnet.c:1772\n usb_probe_interface+0xd01/0x1310 drivers/usb/core/driver.c:396\n call_driver_probe drivers/base/dd.c:-1 [inline]\n...\n\nLocal variable buf.i created at:\n aqc111_read_perm_mac drivers/net/usb/aqc111.c:656 [inline]\n aqc111_bind+0x221/0x1150 drivers/net/usb/aqc111.c:713\n usbnet_probe+0xbe6/0x4390 drivers/net/usb/usbnet.c:1772",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-doc-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-libc-dev-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-source-5.4.0-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-tools-common-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-tools-host-0:5.4.0-227.247.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38153"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/11273279012c922f37cfb4dd95d142803fc07b98",
          "url": "https://git.kernel.org/stable/c/11273279012c922f37cfb4dd95d142803fc07b98"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/30a9e834c74e260533b8d0885e3c89f6f32f7993",
          "url": "https://git.kernel.org/stable/c/30a9e834c74e260533b8d0885e3c89f6f32f7993"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/405b0d610745fb5e84fc2961d9b960abb9f3d107",
          "url": "https://git.kernel.org/stable/c/405b0d610745fb5e84fc2961d9b960abb9f3d107"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/60790d287c1a1ced3554d4a87c2f27bf299a932a",
          "url": "https://git.kernel.org/stable/c/60790d287c1a1ced3554d4a87c2f27bf299a932a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7c01863b1c47f040d9674171e77789a423b9b128",
          "url": "https://git.kernel.org/stable/c/7c01863b1c47f040d9674171e77789a423b9b128"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8c97655275482ef5384ce0501640630a0fc0f6f4",
          "url": "https://git.kernel.org/stable/c/8c97655275482ef5384ce0501640630a0fc0f6f4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/acb47a40b5e38be03ef659b7bacdddc592ed73b7",
          "url": "https://git.kernel.org/stable/c/acb47a40b5e38be03ef659b7bacdddc592ed73b7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f398d2dfe450ce2c031d10b585448862d74a0501",
          "url": "https://git.kernel.org/stable/c/f398d2dfe450ce2c031d10b585448862d74a0501"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-07-03T09:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-10T14:32:07.265333Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775831524",
          "product_ids": [
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-doc-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-host-0:5.4.0-227.247.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775831524"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-doc-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-host-0:5.4.0-227.247.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2026-23204",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: cls_u32: use skb_header_pointer_careful()\n\nskb_header_pointer() does not fully validate negative @offset values.\n\nUse skb_header_pointer_careful() instead.\n\nGangMin Kim provided a report and a repro fooling u32_classify():\n\nBUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0\nnet/sched/cls_u32.c:221",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-doc-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-libc-dev-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-source-5.4.0-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-tools-common-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-tools-host-0:5.4.0-227.247.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-23204"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/13336a6239b9d7c6e61483017bb8bdfe3ceb10a5",
          "url": "https://git.kernel.org/stable/c/13336a6239b9d7c6e61483017bb8bdfe3ceb10a5"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/8a672f177ebe19c93d795fbe967846084fbc7943",
          "url": "https://git.kernel.org/stable/c/8a672f177ebe19c93d795fbe967846084fbc7943"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cabd1a976375780dabab888784e356f574bbaed8",
          "url": "https://git.kernel.org/stable/c/cabd1a976375780dabab888784e356f574bbaed8"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cfa745830e45ecb75c061aa34330ee0cac941cc7",
          "url": "https://git.kernel.org/stable/c/cfa745830e45ecb75c061aa34330ee0cac941cc7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/e41a23e61259f5526af875c3b86b3d42a9bae0e5",
          "url": "https://git.kernel.org/stable/c/e41a23e61259f5526af875c3b86b3d42a9bae0e5"
        }
      ],
      "release_date": "2026-02-14T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-10T14:32:07.265333Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775831524",
          "product_ids": [
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-doc-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-host-0:5.4.0-227.247.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775831524"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-doc-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-host-0:5.4.0-227.247.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38051",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: Fix use-after-free in cifs_fill_dirent\n\nThere is a race condition in the readdir concurrency process, which may\naccess the rsp buffer after it has been released, triggering the\nfollowing KASAN warning.\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in cifs_fill_dirent+0xb03/0xb60 [cifs]\n Read of size 4 at addr ffff8880099b819c by task a.out/342975\n\n CPU: 2 UID: 0 PID: 342975 Comm: a.out Not tainted 6.15.0-rc6+ #240 PREEMPT(full)\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014\n Call Trace:\n  <TASK>\n  dump_stack_lvl+0x53/0x70\n  print_report+0xce/0x640\n  kasan_report+0xb8/0xf0\n  cifs_fill_dirent+0xb03/0xb60 [cifs]\n  cifs_readdir+0x12cb/0x3190 [cifs]\n  iterate_dir+0x1a1/0x520\n  __x64_sys_getdents+0x134/0x220\n  do_syscall_64+0x4b/0x110\n  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n RIP: 0033:0x7f996f64b9f9\n Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89\n f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01\n f0 ff ff  0d f7 c3 0c 00 f7 d8 64 89 8\n RSP: 002b:00007f996f53de78 EFLAGS: 00000207 ORIG_RAX: 000000000000004e\n RAX: ffffffffffffffda RBX: 00007f996f53ecdc RCX: 00007f996f64b9f9\n RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003\n RBP: 00007f996f53dea0 R08: 0000000000000000 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000207 R12: ffffffffffffff88\n R13: 0000000000000000 R14: 00007ffc8cd9a500 R15: 00007f996f51e000\n  </TASK>\n\n Allocated by task 408:\n  kasan_save_stack+0x20/0x40\n  kasan_save_track+0x14/0x30\n  __kasan_slab_alloc+0x6e/0x70\n  kmem_cache_alloc_noprof+0x117/0x3d0\n  mempool_alloc_noprof+0xf2/0x2c0\n  cifs_buf_get+0x36/0x80 [cifs]\n  allocate_buffers+0x1d2/0x330 [cifs]\n  cifs_demultiplex_thread+0x22b/0x2690 [cifs]\n  kthread+0x394/0x720\n  ret_from_fork+0x34/0x70\n  ret_from_fork_asm+0x1a/0x30\n\n Freed by task 342979:\n  kasan_save_stack+0x20/0x40\n  kasan_save_track+0x14/0x30\n  kasan_save_free_info+0x3b/0x60\n  __kasan_slab_free+0x37/0x50\n  kmem_cache_free+0x2b8/0x500\n  cifs_buf_release+0x3c/0x70 [cifs]\n  cifs_readdir+0x1c97/0x3190 [cifs]\n  iterate_dir+0x1a1/0x520\n  __x64_sys_getdents64+0x134/0x220\n  do_syscall_64+0x4b/0x110\n  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\n The buggy address belongs to the object at ffff8880099b8000\n  which belongs to the cache cifs_request of size 16588\n The buggy address is located 412 bytes inside of\n  freed 16588-byte region [ffff8880099b8000, ffff8880099bc0cc)\n\n The buggy address belongs to the physical page:\n page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x99b8\n head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0\n anon flags: 0x80000000000040(head|node=0|zone=1)\n page_type: f5(slab)\n raw: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001\n raw: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000\n head: 0080000000000040 ffff888001e03400 0000000000000000 dead000000000001\n head: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000\n head: 0080000000000003 ffffea0000266e01 00000000ffffffff 00000000ffffffff\n head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008\n page dumped because: kasan: bad access detected\n\n Memory state around the buggy address:\n  ffff8880099b8080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n  ffff8880099b8100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n >ffff8880099b8180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n                             ^\n  ffff8880099b8200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n  ffff8880099b8280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n ==================================================================\n\nPOC is available in the link [1].\n\nThe problem triggering process is as follows:\n\nProcess 1                       Process 2\n-----------------------------------\n---truncated---",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-doc-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-libc-dev-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-source-5.4.0-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-tools-common-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-tools-host-0:5.4.0-227.247.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38051"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/1b197931fbc821bc7e9e91bf619400db563e3338",
          "url": "https://git.kernel.org/stable/c/1b197931fbc821bc7e9e91bf619400db563e3338"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/73cadde98f67f76c5eba00ac0b72c453383cec8b",
          "url": "https://git.kernel.org/stable/c/73cadde98f67f76c5eba00ac0b72c453383cec8b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9bea368648ac46f8593a780760362e40291d22a9",
          "url": "https://git.kernel.org/stable/c/9bea368648ac46f8593a780760362e40291d22a9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9c9aafbacc183598f064902365e107b5e856531f",
          "url": "https://git.kernel.org/stable/c/9c9aafbacc183598f064902365e107b5e856531f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a24c2f05ac3c5b0aaa539d9d913826d2643dfd0e",
          "url": "https://git.kernel.org/stable/c/a24c2f05ac3c5b0aaa539d9d913826d2643dfd0e"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/a7a8fe56e932a36f43e031b398aef92341bf5ea0",
          "url": "https://git.kernel.org/stable/c/a7a8fe56e932a36f43e031b398aef92341bf5ea0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/aee067e88d61eb72e966f094e4749c6b14e7008f",
          "url": "https://git.kernel.org/stable/c/aee067e88d61eb72e966f094e4749c6b14e7008f"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c8623231e0edfcccb7cc6add0288fa0f0594282f",
          "url": "https://git.kernel.org/stable/c/c8623231e0edfcccb7cc6add0288fa0f0594282f"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-06-18T10:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-10T14:32:07.265333Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775831524",
          "product_ids": [
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-doc-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-host-0:5.4.0-227.247.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775831524"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.0,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-doc-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-host-0:5.4.0-227.247.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-53218",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\nf2fs: fix race in concurrent f2fs_stop_gc_thread\nIn my test case, concurrent calls to f2fs shutdown report the following\nstack trace:\nOops: general protection fault, probably for non-canonical address 0xc6cfff63bb5513fc: 0000 [#1] PREEMPT SMP PTI\nCPU: 0 UID: 0 PID: 678 Comm: f2fs_rep_shutdo Not tainted 6.12.0-rc5-next-20241029-g6fb2fa9805c5-dirty #85\nCall Trace:\n<TASK>\n? show_regs+0x8b/0xa0\n? __die_body+0x26/0xa0\n? die_addr+0x54/0x90\n? exc_general_protection+0x24b/0x5c0\n? asm_exc_general_protection+0x26/0x30\n? kthread_stop+0x46/0x390\nf2fs_stop_gc_thread+0x6c/0x110\nf2fs_do_shutdown+0x309/0x3a0\nf2fs_ioc_shutdown+0x150/0x1c0\n__f2fs_ioctl+0xffd/0x2ac0\nf2fs_ioctl+0x76/0xe0\nvfs_ioctl+0x23/0x60\n__x64_sys_ioctl+0xce/0xf0\nx64_sys_call+0x2b1b/0x4540\ndo_syscall_64+0xa7/0x240\nentry_SYSCALL_64_after_hwframe+0x76/0x7e\nThe root cause is a race condition in f2fs_stop_gc_thread() called from\ndifferent f2fs shutdown paths:\n[CPU0]                       [CPU1]\n----------------------       -----------------------\nf2fs_stop_gc_thread          f2fs_stop_gc_thread\ngc_th = sbi->gc_thread\ngc_th = sbi->gc_thread\nkfree(gc_th)\nsbi->gc_thread = NULL\n< gc_th != NULL >\nkthread_stop(gc_th->f2fs_gc_task) //UAF\nThe commit c7f114d864ac (\"f2fs: fix to avoid use-after-free in\nf2fs_stop_gc_thread()\") attempted to fix this issue by using a read\nsemaphore to prevent races between shutdown and remount threads, but\nit fails to prevent all race conditions.\nFix it by converting to write lock of s_umount in f2fs_do_shutdown().",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-doc-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-libc-dev-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-source-5.4.0-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-tools-common-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-tools-host-0:5.4.0-227.247.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-53218"
        }
      ],
      "release_date": "2024-12-27T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-10T14:32:07.265333Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775831524",
          "product_ids": [
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-doc-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-host-0:5.4.0-227.247.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775831524"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-doc-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-host-0:5.4.0-227.247.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-56640",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: fix LGR and link use-after-free issue\n\nWe encountered a LGR/link use-after-free issue, which manifested as\nthe LGR/link refcnt reaching 0 early and entering the clear process,\nmaking resource access unsafe.\n\n refcount_t: addition on 0; use-after-free.\n WARNING: CPU: 14 PID: 107447 at lib/refcount.c:25 refcount_warn_saturate+0x9c/0x140\n Workqueue: events smc_lgr_terminate_work [smc]\n Call trace:\n  refcount_warn_saturate+0x9c/0x140\n  __smc_lgr_terminate.part.45+0x2a8/0x370 [smc]\n  smc_lgr_terminate_work+0x28/0x30 [smc]\n  process_one_work+0x1b8/0x420\n  worker_thread+0x158/0x510\n  kthread+0x114/0x118\n\nor\n\n refcount_t: underflow; use-after-free.\n WARNING: CPU: 6 PID: 93140 at lib/refcount.c:28 refcount_warn_saturate+0xf0/0x140\n Workqueue: smc_hs_wq smc_listen_work [smc]\n Call trace:\n  refcount_warn_saturate+0xf0/0x140\n  smcr_link_put+0x1cc/0x1d8 [smc]\n  smc_conn_free+0x110/0x1b0 [smc]\n  smc_conn_abort+0x50/0x60 [smc]\n  smc_listen_find_device+0x75c/0x790 [smc]\n  smc_listen_work+0x368/0x8a0 [smc]\n  process_one_work+0x1b8/0x420\n  worker_thread+0x158/0x510\n  kthread+0x114/0x118\n\nIt is caused by repeated release of LGR/link refcnt. One suspect is that\nsmc_conn_free() is called repeatedly because some smc_conn_free() from\nserver listening path are not protected by sock lock.\n\ne.g.\n\nCalls under socklock        | smc_listen_work\n-------------------------------------------------------\nlock_sock(sk)               | smc_conn_abort\nsmc_conn_free               | \\- smc_conn_free\n\\- smcr_link_put            |    \\- smcr_link_put (duplicated)\nrelease_sock(sk)\n\nSo here add sock lock protection in smc_listen_work() path, making it\nexclusive with other connection operations.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-doc-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-libc-dev-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-source-5.4.0-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-tools-common-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-tools-host-0:5.4.0-227.247.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-56640"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/0cf598548a6c36d90681d53c6b77d52363f2f295",
          "url": "https://git.kernel.org/stable/c/0cf598548a6c36d90681d53c6b77d52363f2f295"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2c7f14ed9c19ec0f149479d1c2842ec1f9bf76d7",
          "url": "https://git.kernel.org/stable/c/2c7f14ed9c19ec0f149479d1c2842ec1f9bf76d7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/673d606683ac70bc074ca6676b938bff18635226",
          "url": "https://git.kernel.org/stable/c/673d606683ac70bc074ca6676b938bff18635226"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/6f0ae06a234a78ae137064f2c89135ac078a00eb",
          "url": "https://git.kernel.org/stable/c/6f0ae06a234a78ae137064f2c89135ac078a00eb"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f502a88fdd415647a1f2dc45fac71b9c522a052b",
          "url": "https://git.kernel.org/stable/c/f502a88fdd415647a1f2dc45fac71b9c522a052b"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html"
        }
      ],
      "release_date": "2024-12-27T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-10T14:32:07.265333Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775831524",
          "product_ids": [
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-doc-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-host-0:5.4.0-227.247.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775831524"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-doc-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-host-0:5.4.0-227.247.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-38565",
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/core: Exit early on perf_mmap() fail\n\nWhen perf_mmap() fails to allocate a buffer, it still invokes the\nevent_mapped() callback of the related event. On X86 this might increase\nthe perf_rdpmc_allowed reference counter. But nothing undoes this as\nperf_mmap_close() is never called in this case, which causes another\nreference count leak.\n\nReturn early on failure to prevent that.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-doc-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-libc-dev-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-source-5.4.0-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-tools-common-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-tools-host-0:5.4.0-227.247.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-38565"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/07091aade394f690e7b655578140ef84d0e8d7b0",
          "url": "https://git.kernel.org/stable/c/07091aade394f690e7b655578140ef84d0e8d7b0"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/163b0d1a209fe0df5476c1df2330ca12b55abf92",
          "url": "https://git.kernel.org/stable/c/163b0d1a209fe0df5476c1df2330ca12b55abf92"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/27d44145bd576bbef9bf6165bcd78128ec3e6cbd",
          "url": "https://git.kernel.org/stable/c/27d44145bd576bbef9bf6165bcd78128ec3e6cbd"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5ffda7f3ed76ec8defc19d985e33b3b82ba07839",
          "url": "https://git.kernel.org/stable/c/5ffda7f3ed76ec8defc19d985e33b3b82ba07839"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/7ff8521f30c4c2fcd4e88bd7640486602bf8a650",
          "url": "https://git.kernel.org/stable/c/7ff8521f30c4c2fcd4e88bd7640486602bf8a650"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/92043120a2e992800580855498ab8507e1b22db9",
          "url": "https://git.kernel.org/stable/c/92043120a2e992800580855498ab8507e1b22db9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/9b90a48c7de828a15c7a4fc565d46999c6e22d6b",
          "url": "https://git.kernel.org/stable/c/9b90a48c7de828a15c7a4fc565d46999c6e22d6b"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/de85e72598d89880a02170a1cbc27b35a7d978a9",
          "url": "https://git.kernel.org/stable/c/de85e72598d89880a02170a1cbc27b35a7d978a9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f41e9eba77bf97626e04296dc5677d02816d2432",
          "url": "https://git.kernel.org/stable/c/f41e9eba77bf97626e04296dc5677d02816d2432"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"
        }
      ],
      "release_date": "2025-08-19T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-10T14:32:07.265333Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775831524",
          "product_ids": [
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-doc-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-host-0:5.4.0-227.247.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775831524"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-doc-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-host-0:5.4.0-227.247.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2026-23209",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmacvlan: fix error recovery in macvlan_common_newlink()\n\nvalis provided a nice repro to crash the kernel:\n\nip link add p1 type veth peer p2\nip link set address 00:00:00:00:00:20 dev p1\nip link set up dev p1\nip link set up dev p2\n\nip link add mv0 link p2 type macvlan mode source\nip link add invalid% link p2 type macvlan mode source macaddr add 00:00:00:00:00:20\n\nping -c1 -I p1 1.2.3.4\n\nHe also gave a very detailed analysis:\n\n<quote valis>\n\nThe issue is triggered when a new macvlan link is created  with\nMACVLAN_MODE_SOURCE mode and MACVLAN_MACADDR_ADD (or\nMACVLAN_MACADDR_SET) parameter, lower device already has a macvlan\nport and register_netdevice() called from macvlan_common_newlink()\nfails (e.g. because of the invalid link name).\n\nIn this case macvlan_hash_add_source is called from\nmacvlan_change_sources() / macvlan_common_newlink():\n\nThis adds a reference to vlan to the port's vlan_source_hash using\nmacvlan_source_entry.\n\nvlan is a pointer to the priv data of the link that is being created.\n\nWhen register_netdevice() fails, the error is returned from\nmacvlan_newlink() to rtnl_newlink_create():\n\n        if (ops->newlink)\n                err = ops->newlink(dev, &params, extack);\n        else\n                err = register_netdevice(dev);\n        if (err < 0) {\n                free_netdev(dev);\n                goto out;\n        }\n\nand free_netdev() is called, causing a kvfree() on the struct\nnet_device that is still referenced in the source entry attached to\nthe lower device's macvlan port.\n\nNow all packets sent on the macvlan port with a matching source mac\naddress will trigger a use-after-free in macvlan_forward_source().\n\n</quote valis>\n\nWith all that, my fix is to make sure we call macvlan_flush_sources()\nregardless of @create value whenever \"goto destroy_macvlan_port;\"\npath is taken.\n\nMany thanks to valis for following up on this issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-doc-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-libc-dev-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-source-5.4.0-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-tools-common-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-tools-host-0:5.4.0-227.247.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-23209"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/11ba9f0dc865136174cb98834280fb21bbc950c7",
          "url": "https://git.kernel.org/stable/c/11ba9f0dc865136174cb98834280fb21bbc950c7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/5dae6b36a7cb7a4fcf4121b95e9ca7f96f816c8a",
          "url": "https://git.kernel.org/stable/c/5dae6b36a7cb7a4fcf4121b95e9ca7f96f816c8a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/986967a162142710076782d5b93daab93a892980",
          "url": "https://git.kernel.org/stable/c/986967a162142710076782d5b93daab93a892980"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/c43d0e787cbba569ec9d11579ed370b50fab6c9c",
          "url": "https://git.kernel.org/stable/c/c43d0e787cbba569ec9d11579ed370b50fab6c9c"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/cdedcd5aa3f3cb8b7ae0f87ab3a936d0bd583d66",
          "url": "https://git.kernel.org/stable/c/cdedcd5aa3f3cb8b7ae0f87ab3a936d0bd583d66"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/da5c6b8ae47e414be47e5e04def15b25d5c962dc",
          "url": "https://git.kernel.org/stable/c/da5c6b8ae47e414be47e5e04def15b25d5c962dc"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/f8db6475a83649689c087a8f52486fcc53e627e9",
          "url": "https://git.kernel.org/stable/c/f8db6475a83649689c087a8f52486fcc53e627e9"
        }
      ],
      "release_date": "2026-02-14T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-10T14:32:07.265333Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775831524",
          "product_ids": [
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-doc-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-host-0:5.4.0-227.247.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775831524"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-doc-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-host-0:5.4.0-227.247.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2026-23193",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count()\n\nIn iscsit_dec_session_usage_count(), the function calls complete() while\nholding the sess->session_usage_lock. Similar to the connection usage count\nlogic, the waiter signaled by complete() (e.g., in the session release\npath) may wake up and free the iscsit_session structure immediately.\n\nThis creates a race condition where the current thread may attempt to\nexecute spin_unlock_bh() on a session structure that has already been\ndeallocated, resulting in a KASAN slab-use-after-free.\n\nTo resolve this, release the session_usage_lock before calling complete()\nto ensure all dereferences of the sess pointer are finished before the\nwaiter is allowed to proceed with deallocation.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-doc-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-libc-dev-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-source-5.4.0-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
          "Ubuntu-20:linux-tools-common-0:5.4.0-227.247.all",
          "Ubuntu-20:linux-tools-host-0:5.4.0-227.247.all"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-23193"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/11ebafffce31efc6abeb28c509017976fc49f1ca",
          "url": "https://git.kernel.org/stable/c/11ebafffce31efc6abeb28c509017976fc49f1ca"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/2b64015550a13bcc72910be0565548d9a754d46d",
          "url": "https://git.kernel.org/stable/c/2b64015550a13bcc72910be0565548d9a754d46d"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/41b86a9ec037bd3435d68dd3692f0891a207e7e7",
          "url": "https://git.kernel.org/stable/c/41b86a9ec037bd3435d68dd3692f0891a207e7e7"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/4530f4e4d0e6a207110b0ffed0c911bca43531a4",
          "url": "https://git.kernel.org/stable/c/4530f4e4d0e6a207110b0ffed0c911bca43531a4"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/84dc6037390b8607c5551047d3970336cb51ba9a",
          "url": "https://git.kernel.org/stable/c/84dc6037390b8607c5551047d3970336cb51ba9a"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/d8dbdc146e9e9a976931b78715be2e91299049f9",
          "url": "https://git.kernel.org/stable/c/d8dbdc146e9e9a976931b78715be2e91299049f9"
        },
        {
          "category": "external",
          "summary": "https://git.kernel.org/stable/c/fd8b0900173307039d3a84644c2fee041a7ed4fb",
          "url": "https://git.kernel.org/stable/c/fd8b0900173307039d3a84644c2fee041a7ed4fb"
        }
      ],
      "release_date": "2026-02-14T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-10T14:32:07.265333Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775831524",
          "product_ids": [
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-doc-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-host-0:5.4.0-227.247.all"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775831524"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-buildinfo-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-cloud-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-doc-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-headers-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-image-unsigned-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-libc-dev-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-modules-extra-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-source-5.4.0-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-generic-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-5.4.0-227-tuxcare.els9-lowlatency-0:5.4.0-227.247.amd64",
            "Ubuntu-20:linux-tools-common-0:5.4.0-227.247.all",
            "Ubuntu-20:linux-tools-host-0:5.4.0-227.247.all"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}