{"id":"USN-5468-1","summary":"linux, linux-aws, linux-aws-5.13, linux-azure, linux-azure-5.13, linux-gcp, linux-gcp-5.13, linux-hwe-5.13, linux-intel-5.13, linux-kvm, linux-oracle, linux-oracle-5.13, linux-raspi vulnerabilities","details":"It was discovered that the Linux kernel did not properly restrict access to\nthe kernel debugger when booted in secure boot environments. A privileged\nattacker could use this to bypass UEFI Secure Boot restrictions.\n(CVE-2022-21499)\n\nAaron Adams discovered that the netfilter subsystem in the Linux kernel did\nnot properly handle the removal of stateful expressions in some situations,\nleading to a use-after-free vulnerability. A local attacker could use this\nto cause a denial of service (system crash) or execute arbitrary code.\n(CVE-2022-1966)\n\nQiuhao Li, Gaoning Pan and Yongkang Jia discovered that the KVM\nimplementation in the Linux kernel did not properly perform guest page\ntable updates in some situations. An attacker in a guest vm could possibly\nuse this to crash the host OS. (CVE-2022-1158)\n\nZiming Zhang discovered that the netfilter subsystem in the Linux kernel\ndid not properly validate sets with multiple ranged fields. A local\nattacker could use this to cause a denial of service or execute arbitrary\ncode. (CVE-2022-1972)\n\nIt was discovered that the USB Gadget file system interface in the Linux\nkernel contained a use-after-free vulnerability. A local attacker could use\nthis to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2022-24958)\n\nIt was discovered that the EMS CAN/USB interface implementation in the\nLinux kernel contained a double-free vulnerability when handling certain\nerror conditions. A local attacker could use this to cause a denial of\nservice (memory exhaustion). (CVE-2022-28390)\n","modified":"2026-04-27T16:17:20.575207659Z","published":"2022-06-08T04:29:36Z","related":["UBUNTU-CVE-2022-1158","UBUNTU-CVE-2022-1966","UBUNTU-CVE-2022-1972","UBUNTU-CVE-2022-21499","UBUNTU-CVE-2022-24958","UBUNTU-CVE-2022-28390"],"upstream":["CVE-2022-1158","CVE-2022-1966","CVE-2022-1972","CVE-2022-21499","CVE-2022-24958","CVE-2022-28390","UBUNTU-CVE-2022-1158","UBUNTU-CVE-2022-1966","UBUNTU-CVE-2022-1972","UBUNTU-CVE-2022-21499","UBUNTU-CVE-2022-24958","UBUNTU-CVE-2022-28390"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5468-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1158"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1966"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1972"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-21499"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-24958"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-28390"}],"affected":[{"package":{"name":"linux-aws-5.13","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-aws-5.13@5.13.0-1028.31~20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.13.0-1028.31~20.04.1"}]}],"versions":["5.13.0-1008.9~20.04.2","5.13.0-1011.12~20.04.1","5.13.0-1012.13~20.04.1","5.13.0-1014.15~20.04.1","5.13.0-1017.19~20.04.1","5.13.0-1019.21~20.04.1","5.13.0-1021.23~20.04.2","5.13.0-1022.24~20.04.1","5.13.0-1023.25~20.04.1","5.13.0-1025.27~20.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-aws-5.13-cloud-tools-5.13.0-1028","binary_version":"5.13.0-1028.31~20.04.1"},{"binary_name":"linux-aws-5.13-headers-5.13.0-1028","binary_version":"5.13.0-1028.31~20.04.1"},{"binary_name":"linux-aws-5.13-tools-5.13.0-1028","binary_version":"5.13.0-1028.31~20.04.1"},{"binary_name":"linux-buildinfo-5.13.0-1028-aws","binary_version":"5.13.0-1028.31~20.04.1"},{"binary_name":"linux-cloud-tools-5.13.0-1028-aws","binary_version":"5.13.0-1028.31~20.04.1"},{"binary_name":"linux-headers-5.13.0-1028-aws","binary_version":"5.13.0-1028.31~20.04.1"},{"binary_name":"linux-image-unsigned-5.13.0-1028-aws","binary_version":"5.13.0-1028.31~20.04.1"},{"binary_name":"linux-modules-5.13.0-1028-aws","binary_version":"5.13.0-1028.31~20.04.1"},{"binary_name":"linux-modules-extra-5.13.0-1028-aws","binary_version":"5.13.0-1028.31~20.04.1"},{"binary_name":"linux-tools-5.13.0-1028-aws","binary_version":"5.13.0-1028.31~20.04.1"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"id":"CVE-2022-1158","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-1966","severity":[{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2022-1972","severity":[{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-21499","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2022-24958","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-28390","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5468-1.json"}},{"package":{"name":"linux-azure-5.13","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-azure-5.13@5.13.0-1028.33~20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.13.0-1028.33~20.04.1"}]}],"versions":["5.13.0-1009.10~20.04.2","5.13.0-1012.14~20.04.1","5.13.0-1013.15~20.04.1","5.13.0-1014.16~20.04.1","5.13.0-1017.19~20.04.1","5.13.0-1021.24~20.04.1","5.13.0-1022.26~20.04.1","5.13.0-1023.27~20.04.1","5.13.0-1025.29~20.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-azure-5.13-cloud-tools-5.13.0-1028","binary_version":"5.13.0-1028.33~20.04.1"},{"binary_name":"linux-azure-5.13-headers-5.13.0-1028","binary_version":"5.13.0-1028.33~20.04.1"},{"binary_name":"linux-azure-5.13-tools-5.13.0-1028","binary_version":"5.13.0-1028.33~20.04.1"},{"binary_name":"linux-buildinfo-5.13.0-1028-azure","binary_version":"5.13.0-1028.33~20.04.1"},{"binary_name":"linux-cloud-tools-5.13.0-1028-azure","binary_version":"5.13.0-1028.33~20.04.1"},{"binary_name":"linux-headers-5.13.0-1028-azure","binary_version":"5.13.0-1028.33~20.04.1"},{"binary_name":"linux-image-unsigned-5.13.0-1028-azure","binary_version":"5.13.0-1028.33~20.04.1"},{"binary_name":"linux-modules-5.13.0-1028-azure","binary_version":"5.13.0-1028.33~20.04.1"},{"binary_name":"linux-modules-extra-5.13.0-1028-azure","binary_version":"5.13.0-1028.33~20.04.1"},{"binary_name":"linux-tools-5.13.0-1028-azure","binary_version":"5.13.0-1028.33~20.04.1"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"id":"CVE-2022-1158","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-1966","severity":[{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2022-1972","severity":[{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-21499","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2022-24958","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-28390","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5468-1.json"}},{"package":{"name":"linux-gcp-5.13","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-gcp-5.13@5.13.0-1030.36~20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.13.0-1030.36~20.04.1"}]}],"versions":["5.13.0-1008.9~20.04.3","5.13.0-1012.15~20.04.1","5.13.0-1013.16~20.04.1","5.13.0-1015.18~20.04.1","5.13.0-1019.23~20.04.1","5.13.0-1021.25~20.04.1","5.13.0-1023.28~20.04.1","5.13.0-1024.29~20.04.1","5.13.0-1025.30~20.04.1","5.13.0-1027.32~20.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-buildinfo-5.13.0-1030-gcp","binary_version":"5.13.0-1030.36~20.04.1"},{"binary_name":"linux-gcp-5.13-headers-5.13.0-1030","binary_version":"5.13.0-1030.36~20.04.1"},{"binary_name":"linux-gcp-5.13-tools-5.13.0-1030","binary_version":"5.13.0-1030.36~20.04.1"},{"binary_name":"linux-headers-5.13.0-1030-gcp","binary_version":"5.13.0-1030.36~20.04.1"},{"binary_name":"linux-image-unsigned-5.13.0-1030-gcp","binary_version":"5.13.0-1030.36~20.04.1"},{"binary_name":"linux-modules-5.13.0-1030-gcp","binary_version":"5.13.0-1030.36~20.04.1"},{"binary_name":"linux-modules-extra-5.13.0-1030-gcp","binary_version":"5.13.0-1030.36~20.04.1"},{"binary_name":"linux-tools-5.13.0-1030-gcp","binary_version":"5.13.0-1030.36~20.04.1"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"id":"CVE-2022-1158","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-1966","severity":[{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2022-1972","severity":[{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-21499","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2022-24958","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-28390","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5468-1.json"}},{"package":{"name":"linux-hwe-5.13","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-hwe-5.13@5.13.0-48.54~20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.13.0-48.54~20.04.1"}]}],"versions":["5.13.0-21.21~20.04.1","5.13.0-22.22~20.04.1","5.13.0-23.23~20.04.2","5.13.0-25.26~20.04.1","5.13.0-27.29~20.04.1","5.13.0-28.31~20.04.1","5.13.0-30.33~20.04.1","5.13.0-35.40~20.04.1","5.13.0-37.42~20.04.1","5.13.0-39.44~20.04.1","5.13.0-40.45~20.04.1","5.13.0-41.46~20.04.1","5.13.0-44.49~20.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"block-modules-5.13.0-48-generic-64k-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"block-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"block-modules-5.13.0-48-generic-lpae-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"crypto-modules-5.13.0-48-generic-64k-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"crypto-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"crypto-modules-5.13.0-48-generic-lpae-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"dasd-extra-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"dasd-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"fat-modules-5.13.0-48-generic-64k-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"fat-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"fat-modules-5.13.0-48-generic-lpae-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"fb-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"firewire-core-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"floppy-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"fs-core-modules-5.13.0-48-generic-64k-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"fs-core-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"fs-core-modules-5.13.0-48-generic-lpae-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"fs-secondary-modules-5.13.0-48-generic-64k-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"fs-secondary-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"fs-secondary-modules-5.13.0-48-generic-lpae-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"input-modules-5.13.0-48-generic-64k-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"input-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"input-modules-5.13.0-48-generic-lpae-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"ipmi-modules-5.13.0-48-generic-64k-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"ipmi-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"ipmi-modules-5.13.0-48-generic-lpae-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"kernel-image-5.13.0-48-generic-64k-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"kernel-image-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"kernel-image-5.13.0-48-generic-lpae-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-buildinfo-5.13.0-48-generic","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-buildinfo-5.13.0-48-generic-64k","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-buildinfo-5.13.0-48-generic-lpae","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-buildinfo-5.13.0-48-lowlatency","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-cloud-tools-5.13.0-48-generic","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-cloud-tools-5.13.0-48-lowlatency","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-headers-5.13.0-48-generic","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-headers-5.13.0-48-generic-64k","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-headers-5.13.0-48-generic-lpae","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-headers-5.13.0-48-lowlatency","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-hwe-5.13-cloud-tools-5.13.0-48","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-hwe-5.13-cloud-tools-common","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-hwe-5.13-headers-5.13.0-48","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-hwe-5.13-source-5.13.0","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-hwe-5.13-tools-5.13.0-48","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-hwe-5.13-tools-common","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-hwe-5.13-tools-host","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-hwe-5.13-udebs-generic","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-hwe-5.13-udebs-generic-64k","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-hwe-5.13-udebs-generic-lpae","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-image-5.13.0-48-generic","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-image-5.13.0-48-generic-lpae","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-image-unsigned-5.13.0-48-generic","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-image-unsigned-5.13.0-48-generic-64k","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-image-unsigned-5.13.0-48-lowlatency","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-modules-5.13.0-48-generic","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-modules-5.13.0-48-generic-64k","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-modules-5.13.0-48-generic-lpae","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-modules-5.13.0-48-lowlatency","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-modules-extra-5.13.0-48-generic","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-tools-5.13.0-48-generic","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-tools-5.13.0-48-generic-64k","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-tools-5.13.0-48-generic-lpae","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"linux-tools-5.13.0-48-lowlatency","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"md-modules-5.13.0-48-generic-64k-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"md-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"md-modules-5.13.0-48-generic-lpae-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"message-modules-5.13.0-48-generic-64k-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"message-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"mouse-modules-5.13.0-48-generic-64k-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"mouse-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"mouse-modules-5.13.0-48-generic-lpae-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"multipath-modules-5.13.0-48-generic-64k-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"multipath-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"multipath-modules-5.13.0-48-generic-lpae-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"nfs-modules-5.13.0-48-generic-64k-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"nfs-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"nfs-modules-5.13.0-48-generic-lpae-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"nic-modules-5.13.0-48-generic-64k-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"nic-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"nic-modules-5.13.0-48-generic-lpae-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"nic-pcmcia-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"nic-shared-modules-5.13.0-48-generic-64k-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"nic-shared-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"nic-shared-modules-5.13.0-48-generic-lpae-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"nic-usb-modules-5.13.0-48-generic-64k-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"nic-usb-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"nic-usb-modules-5.13.0-48-generic-lpae-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"parport-modules-5.13.0-48-generic-64k-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"parport-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"parport-modules-5.13.0-48-generic-lpae-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"pata-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"pcmcia-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"pcmcia-storage-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"plip-modules-5.13.0-48-generic-64k-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"plip-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"plip-modules-5.13.0-48-generic-lpae-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"ppp-modules-5.13.0-48-generic-64k-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"ppp-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"ppp-modules-5.13.0-48-generic-lpae-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"sata-modules-5.13.0-48-generic-64k-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"sata-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"sata-modules-5.13.0-48-generic-lpae-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"scsi-modules-5.13.0-48-generic-64k-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"scsi-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"scsi-modules-5.13.0-48-generic-lpae-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"serial-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"storage-core-modules-5.13.0-48-generic-64k-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"storage-core-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"storage-core-modules-5.13.0-48-generic-lpae-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"usb-modules-5.13.0-48-generic-64k-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"usb-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"usb-modules-5.13.0-48-generic-lpae-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"virtio-modules-5.13.0-48-generic-64k-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"virtio-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"vlan-modules-5.13.0-48-generic-64k-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"vlan-modules-5.13.0-48-generic-di","binary_version":"5.13.0-48.54~20.04.1"},{"binary_name":"vlan-modules-5.13.0-48-generic-lpae-di","binary_version":"5.13.0-48.54~20.04.1"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"id":"CVE-2022-1158","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-1966","severity":[{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2022-1972","severity":[{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-21499","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2022-24958","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-28390","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5468-1.json"}},{"package":{"name":"linux-intel-5.13","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-intel-5.13@5.13.0-1014.15?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.13.0-1014.15"}]}],"versions":["5.13.0-1007.7","5.13.0-1008.8","5.13.0-1009.9","5.13.0-1010.10","5.13.0-1011.11"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-buildinfo-5.13.0-1014-intel","binary_version":"5.13.0-1014.15"},{"binary_name":"linux-cloud-tools-5.13.0-1014-intel","binary_version":"5.13.0-1014.15"},{"binary_name":"linux-headers-5.13.0-1014-intel","binary_version":"5.13.0-1014.15"},{"binary_name":"linux-image-unsigned-5.13.0-1014-intel","binary_version":"5.13.0-1014.15"},{"binary_name":"linux-intel-5.13-cloud-tools-5.13.0-1014","binary_version":"5.13.0-1014.15"},{"binary_name":"linux-intel-5.13-cloud-tools-common","binary_version":"5.13.0-1014.15"},{"binary_name":"linux-intel-5.13-headers-5.13.0-1014","binary_version":"5.13.0-1014.15"},{"binary_name":"linux-intel-5.13-source-5.13.0","binary_version":"5.13.0-1014.15"},{"binary_name":"linux-intel-5.13-tools-5.13.0-1014","binary_version":"5.13.0-1014.15"},{"binary_name":"linux-intel-5.13-tools-common","binary_version":"5.13.0-1014.15"},{"binary_name":"linux-intel-5.13-tools-host","binary_version":"5.13.0-1014.15"},{"binary_name":"linux-modules-5.13.0-1014-intel","binary_version":"5.13.0-1014.15"},{"binary_name":"linux-modules-extra-5.13.0-1014-intel","binary_version":"5.13.0-1014.15"},{"binary_name":"linux-tools-5.13.0-1014-intel","binary_version":"5.13.0-1014.15"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"id":"CVE-2022-1158","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-1966","severity":[{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2022-1972","severity":[{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-21499","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2022-24958","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-28390","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5468-1.json"}},{"package":{"name":"linux-oracle-5.13","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/linux-oracle-5.13@5.13.0-1033.39~20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.13.0-1033.39~20.04.1"}]}],"versions":["5.13.0-1011.13~20.04.2","5.13.0-1015.19~20.04.1","5.13.0-1016.20~20.04.1","5.13.0-1018.22~20.04.1","5.13.0-1021.26~20.04.1","5.13.0-1025.30~20.04.1","5.13.0-1027.32~20.04.1","5.13.0-1028.33~20.04.1","5.13.0-1030.35~20.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-buildinfo-5.13.0-1033-oracle","binary_version":"5.13.0-1033.39~20.04.1"},{"binary_name":"linux-headers-5.13.0-1033-oracle","binary_version":"5.13.0-1033.39~20.04.1"},{"binary_name":"linux-image-unsigned-5.13.0-1033-oracle","binary_version":"5.13.0-1033.39~20.04.1"},{"binary_name":"linux-modules-5.13.0-1033-oracle","binary_version":"5.13.0-1033.39~20.04.1"},{"binary_name":"linux-modules-extra-5.13.0-1033-oracle","binary_version":"5.13.0-1033.39~20.04.1"},{"binary_name":"linux-oracle-5.13-headers-5.13.0-1033","binary_version":"5.13.0-1033.39~20.04.1"},{"binary_name":"linux-oracle-5.13-tools-5.13.0-1033","binary_version":"5.13.0-1033.39~20.04.1"},{"binary_name":"linux-tools-5.13.0-1033-oracle","binary_version":"5.13.0-1033.39~20.04.1"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"id":"CVE-2022-1158","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-1966","severity":[{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2022-1972","severity":[{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-21499","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]},{"id":"CVE-2022-24958","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-28390","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5468-1.json"}}],"schema_version":"1.7.5"}