USN-5417-1

Source
https://ubuntu.com/security/notices/USN-5417-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5417-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-5417-1
Upstream
Related
Published
2022-05-12T01:17:41.593399Z
Modified
2025-10-13T04:35:55Z
Summary
linux, linux-aws, linux-aws-5.13, linux-azure, linux-azure-5.13, linux-gcp, linux-gcp-5.13, linux-hwe-5.13, linux-kvm, linux-oracle, linux-raspi vulnerabilities
Details

Ke Sun, Alyssa Milburn, Henrique Kawakami, Emma Benoit, Igor Chervatyuk, Lisa Aichele, and Thais Moreira Hamasaki discovered that the Spectre Variant 2 mitigations for AMD processors on Linux were insufficient in some situations. A local attacker could possibly use this to expose sensitive information. (CVE-2021-26401)

It was discovered that the MMC/SD subsystem in the Linux kernel did not properly handle read errors from SD cards in certain situations. An attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2022-20008)

It was discovered that the USB gadget subsystem in the Linux kernel did not properly validate interface descriptor requests. An attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-25258)

It was discovered that the Remote NDIS (RNDIS) USB gadget implementation in the Linux kernel did not properly validate the size of the RNDISMSGSET command. An attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2022-25375)

It was discovered that the ST21NFCA NFC driver in the Linux kernel did not properly validate the size of certain data in EVT_TRANSACTION events. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-26490)

It was discovered that the USB SR9700 ethernet device driver for the Linux kernel did not properly validate the length of requests from the device. A physically proximate attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2022-26966)

It was discovered that the Xilinx USB2 device gadget driver in the Linux kernel did not properly validate endpoint indices from the host. A physically proximate attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-27223)

Miaoqian Lin discovered that the RDMA Transport (RTRS) client implementation in the Linux kernel contained a double-free when handling certain error conditions. An attacker could use this to cause a denial of service (system crash). (CVE-2022-29156)

References

Affected packages

Ubuntu:20.04:LTS / linux-aws-5.13

Package

Name
linux-aws-5.13
Purl
pkg:deb/ubuntu/linux-aws-5.13@5.13.0-1023.25~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.13.0-1023.25~20.04.1

Affected versions

5.*

5.13.0-1008.9~20.04.2
5.13.0-1011.12~20.04.1
5.13.0-1012.13~20.04.1
5.13.0-1014.15~20.04.1
5.13.0-1017.19~20.04.1
5.13.0-1019.21~20.04.1
5.13.0-1021.23~20.04.2
5.13.0-1022.24~20.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "linux-aws-5.13-cloud-tools-5.13.0-1023",
            "binary_version": "5.13.0-1023.25~20.04.1"
        },
        {
            "binary_name": "linux-aws-5.13-headers-5.13.0-1023",
            "binary_version": "5.13.0-1023.25~20.04.1"
        },
        {
            "binary_name": "linux-aws-5.13-tools-5.13.0-1023",
            "binary_version": "5.13.0-1023.25~20.04.1"
        },
        {
            "binary_name": "linux-buildinfo-5.13.0-1023-aws",
            "binary_version": "5.13.0-1023.25~20.04.1"
        },
        {
            "binary_name": "linux-cloud-tools-5.13.0-1023-aws",
            "binary_version": "5.13.0-1023.25~20.04.1"
        },
        {
            "binary_name": "linux-headers-5.13.0-1023-aws",
            "binary_version": "5.13.0-1023.25~20.04.1"
        },
        {
            "binary_name": "linux-image-unsigned-5.13.0-1023-aws",
            "binary_version": "5.13.0-1023.25~20.04.1"
        },
        {
            "binary_name": "linux-modules-5.13.0-1023-aws",
            "binary_version": "5.13.0-1023.25~20.04.1"
        },
        {
            "binary_name": "linux-modules-extra-5.13.0-1023-aws",
            "binary_version": "5.13.0-1023.25~20.04.1"
        },
        {
            "binary_name": "linux-tools-5.13.0-1023-aws",
            "binary_version": "5.13.0-1023.25~20.04.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:20.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2021-26401"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-20008"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-25258"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-25375"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-26490"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-26966"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "low"
                }
            ],
            "id": "CVE-2022-27223"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-29156"
        }
    ]
}

Ubuntu:20.04:LTS / linux-azure-5.13

Package

Name
linux-azure-5.13
Purl
pkg:deb/ubuntu/linux-azure-5.13@5.13.0-1023.27~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.13.0-1023.27~20.04.1

Affected versions

5.*

5.13.0-1009.10~20.04.2
5.13.0-1012.14~20.04.1
5.13.0-1013.15~20.04.1
5.13.0-1014.16~20.04.1
5.13.0-1017.19~20.04.1
5.13.0-1021.24~20.04.1
5.13.0-1022.26~20.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "linux-azure-5.13-cloud-tools-5.13.0-1023",
            "binary_version": "5.13.0-1023.27~20.04.1"
        },
        {
            "binary_name": "linux-azure-5.13-headers-5.13.0-1023",
            "binary_version": "5.13.0-1023.27~20.04.1"
        },
        {
            "binary_name": "linux-azure-5.13-tools-5.13.0-1023",
            "binary_version": "5.13.0-1023.27~20.04.1"
        },
        {
            "binary_name": "linux-buildinfo-5.13.0-1023-azure",
            "binary_version": "5.13.0-1023.27~20.04.1"
        },
        {
            "binary_name": "linux-cloud-tools-5.13.0-1023-azure",
            "binary_version": "5.13.0-1023.27~20.04.1"
        },
        {
            "binary_name": "linux-headers-5.13.0-1023-azure",
            "binary_version": "5.13.0-1023.27~20.04.1"
        },
        {
            "binary_name": "linux-image-unsigned-5.13.0-1023-azure",
            "binary_version": "5.13.0-1023.27~20.04.1"
        },
        {
            "binary_name": "linux-modules-5.13.0-1023-azure",
            "binary_version": "5.13.0-1023.27~20.04.1"
        },
        {
            "binary_name": "linux-modules-extra-5.13.0-1023-azure",
            "binary_version": "5.13.0-1023.27~20.04.1"
        },
        {
            "binary_name": "linux-tools-5.13.0-1023-azure",
            "binary_version": "5.13.0-1023.27~20.04.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:20.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2021-26401"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-20008"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-25258"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-25375"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-26490"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-26966"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "low"
                }
            ],
            "id": "CVE-2022-27223"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-29156"
        }
    ]
}

Ubuntu:20.04:LTS / linux-gcp-5.13

Package

Name
linux-gcp-5.13
Purl
pkg:deb/ubuntu/linux-gcp-5.13@5.13.0-1025.30~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.13.0-1025.30~20.04.1

Affected versions

5.*

5.13.0-1008.9~20.04.3
5.13.0-1012.15~20.04.1
5.13.0-1013.16~20.04.1
5.13.0-1015.18~20.04.1
5.13.0-1019.23~20.04.1
5.13.0-1021.25~20.04.1
5.13.0-1023.28~20.04.1
5.13.0-1024.29~20.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "linux-buildinfo-5.13.0-1025-gcp",
            "binary_version": "5.13.0-1025.30~20.04.1"
        },
        {
            "binary_name": "linux-gcp-5.13-headers-5.13.0-1025",
            "binary_version": "5.13.0-1025.30~20.04.1"
        },
        {
            "binary_name": "linux-gcp-5.13-tools-5.13.0-1025",
            "binary_version": "5.13.0-1025.30~20.04.1"
        },
        {
            "binary_name": "linux-headers-5.13.0-1025-gcp",
            "binary_version": "5.13.0-1025.30~20.04.1"
        },
        {
            "binary_name": "linux-image-unsigned-5.13.0-1025-gcp",
            "binary_version": "5.13.0-1025.30~20.04.1"
        },
        {
            "binary_name": "linux-modules-5.13.0-1025-gcp",
            "binary_version": "5.13.0-1025.30~20.04.1"
        },
        {
            "binary_name": "linux-modules-extra-5.13.0-1025-gcp",
            "binary_version": "5.13.0-1025.30~20.04.1"
        },
        {
            "binary_name": "linux-tools-5.13.0-1025-gcp",
            "binary_version": "5.13.0-1025.30~20.04.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:20.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2021-26401"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-20008"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-25258"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-25375"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-26490"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-26966"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "low"
                }
            ],
            "id": "CVE-2022-27223"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-29156"
        }
    ]
}

Ubuntu:20.04:LTS / linux-hwe-5.13

Package

Name
linux-hwe-5.13
Purl
pkg:deb/ubuntu/linux-hwe-5.13@5.13.0-41.46~20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.13.0-41.46~20.04.1

Affected versions

5.*

5.13.0-21.21~20.04.1
5.13.0-22.22~20.04.1
5.13.0-23.23~20.04.2
5.13.0-25.26~20.04.1
5.13.0-27.29~20.04.1
5.13.0-28.31~20.04.1
5.13.0-30.33~20.04.1
5.13.0-35.40~20.04.1
5.13.0-37.42~20.04.1
5.13.0-39.44~20.04.1
5.13.0-40.45~20.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "block-modules-5.13.0-41-generic-64k-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "block-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "block-modules-5.13.0-41-generic-lpae-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "crypto-modules-5.13.0-41-generic-64k-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "crypto-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "crypto-modules-5.13.0-41-generic-lpae-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "dasd-extra-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "dasd-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "fat-modules-5.13.0-41-generic-64k-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "fat-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "fat-modules-5.13.0-41-generic-lpae-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "fb-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "firewire-core-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "floppy-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "fs-core-modules-5.13.0-41-generic-64k-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "fs-core-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "fs-core-modules-5.13.0-41-generic-lpae-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "fs-secondary-modules-5.13.0-41-generic-64k-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "fs-secondary-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "fs-secondary-modules-5.13.0-41-generic-lpae-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "input-modules-5.13.0-41-generic-64k-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "input-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "input-modules-5.13.0-41-generic-lpae-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "ipmi-modules-5.13.0-41-generic-64k-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "ipmi-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "ipmi-modules-5.13.0-41-generic-lpae-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "kernel-image-5.13.0-41-generic-64k-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "kernel-image-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "kernel-image-5.13.0-41-generic-lpae-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-buildinfo-5.13.0-41-generic",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-buildinfo-5.13.0-41-generic-64k",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-buildinfo-5.13.0-41-generic-lpae",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-buildinfo-5.13.0-41-lowlatency",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-cloud-tools-5.13.0-41-generic",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-cloud-tools-5.13.0-41-lowlatency",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-headers-5.13.0-41-generic",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-headers-5.13.0-41-generic-64k",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-headers-5.13.0-41-generic-lpae",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-headers-5.13.0-41-lowlatency",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-hwe-5.13-cloud-tools-5.13.0-41",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-hwe-5.13-cloud-tools-common",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-hwe-5.13-headers-5.13.0-41",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-hwe-5.13-source-5.13.0",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-hwe-5.13-tools-5.13.0-41",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-hwe-5.13-tools-common",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-hwe-5.13-tools-host",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-hwe-5.13-udebs-generic",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-hwe-5.13-udebs-generic-64k",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-hwe-5.13-udebs-generic-lpae",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-image-5.13.0-41-generic",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-image-5.13.0-41-generic-lpae",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-image-unsigned-5.13.0-41-generic",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-image-unsigned-5.13.0-41-generic-64k",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-image-unsigned-5.13.0-41-lowlatency",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-modules-5.13.0-41-generic",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-modules-5.13.0-41-generic-64k",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-modules-5.13.0-41-generic-lpae",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-modules-5.13.0-41-lowlatency",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-modules-extra-5.13.0-41-generic",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-tools-5.13.0-41-generic",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-tools-5.13.0-41-generic-64k",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-tools-5.13.0-41-generic-lpae",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "linux-tools-5.13.0-41-lowlatency",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "md-modules-5.13.0-41-generic-64k-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "md-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "md-modules-5.13.0-41-generic-lpae-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "message-modules-5.13.0-41-generic-64k-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "message-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "mouse-modules-5.13.0-41-generic-64k-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "mouse-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "mouse-modules-5.13.0-41-generic-lpae-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "multipath-modules-5.13.0-41-generic-64k-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "multipath-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "multipath-modules-5.13.0-41-generic-lpae-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "nfs-modules-5.13.0-41-generic-64k-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "nfs-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "nfs-modules-5.13.0-41-generic-lpae-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "nic-modules-5.13.0-41-generic-64k-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "nic-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "nic-modules-5.13.0-41-generic-lpae-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "nic-pcmcia-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "nic-shared-modules-5.13.0-41-generic-64k-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "nic-shared-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "nic-shared-modules-5.13.0-41-generic-lpae-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "nic-usb-modules-5.13.0-41-generic-64k-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "nic-usb-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "nic-usb-modules-5.13.0-41-generic-lpae-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "parport-modules-5.13.0-41-generic-64k-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "parport-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "parport-modules-5.13.0-41-generic-lpae-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "pata-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "pcmcia-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "pcmcia-storage-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "plip-modules-5.13.0-41-generic-64k-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "plip-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "plip-modules-5.13.0-41-generic-lpae-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "ppp-modules-5.13.0-41-generic-64k-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "ppp-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "ppp-modules-5.13.0-41-generic-lpae-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "sata-modules-5.13.0-41-generic-64k-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "sata-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "sata-modules-5.13.0-41-generic-lpae-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "scsi-modules-5.13.0-41-generic-64k-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "scsi-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "scsi-modules-5.13.0-41-generic-lpae-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "serial-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "storage-core-modules-5.13.0-41-generic-64k-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "storage-core-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "storage-core-modules-5.13.0-41-generic-lpae-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "usb-modules-5.13.0-41-generic-64k-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "usb-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "usb-modules-5.13.0-41-generic-lpae-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "virtio-modules-5.13.0-41-generic-64k-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "virtio-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "vlan-modules-5.13.0-41-generic-64k-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "vlan-modules-5.13.0-41-generic-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        },
        {
            "binary_name": "vlan-modules-5.13.0-41-generic-lpae-di",
            "binary_version": "5.13.0-41.46~20.04.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:20.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2021-26401"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-20008"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-25258"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-25375"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-26490"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-26966"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "low"
                }
            ],
            "id": "CVE-2022-27223"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2022-29156"
        }
    ]
}