USN-8013-4

Source
https://ubuntu.com/security/notices/USN-8013-4
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8013-4.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-8013-4
Upstream
Related
Published
2026-02-11T18:34:22Z
Modified
2026-02-12T06:58:41.882266Z
Summary
linux-aws-5.15, linux-gcp-5.15, linux-nvidia-tegra-igx, linux-oracle-5.15, linux-xilinx-zynqmp vulnerabilities
Details

Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - Cryptographic API; - SMB network file system; (CVE-2025-38561, CVE-2025-40019)

References

Affected packages

Ubuntu:Pro:20.04:LTS / linux-aws-5.15

Package

Name
linux-aws-5.15
Purl
pkg:deb/ubuntu/linux-aws-5.15@5.15.0-1099.106~20.04.1?arch=source&distro=esm-infra/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1099.106~20.04.1

Affected versions

5.*
5.15.0-1014.18~20.04.1
5.15.0-1015.19~20.04.1
5.15.0-1017.21~20.04.1
5.15.0-1019.23~20.04.1
5.15.0-1020.24~20.04.1
5.15.0-1021.25~20.04.1
5.15.0-1022.26~20.04.1
5.15.0-1023.27~20.04.1
5.15.0-1026.30~20.04.2
5.15.0-1027.31~20.04.1
5.15.0-1028.32~20.04.1
5.15.0-1030.34~20.04.1
5.15.0-1031.35~20.04.1
5.15.0-1033.37~20.04.1
5.15.0-1034.38~20.04.1
5.15.0-1035.39~20.04.1
5.15.0-1036.40~20.04.1
5.15.0-1037.41~20.04.1
5.15.0-1038.43~20.04.1
5.15.0-1039.44~20.04.1
5.15.0-1040.45~20.04.1
5.15.0-1041.46~20.04.1
5.15.0-1043.48~20.04.1
5.15.0-1044.49~20.04.1
5.15.0-1045.50~20.04.1
5.15.0-1047.52~20.04.1
5.15.0-1048.53~20.04.1
5.15.0-1049.54~20.04.1
5.15.0-1050.55~20.04.1
5.15.0-1051.56~20.04.1
5.15.0-1052.57~20.04.1
5.15.0-1053.58~20.04.1
5.15.0-1055.60~20.04.1
5.15.0-1056.61~20.04.1
5.15.0-1057.63~20.04.1
5.15.0-1058.64~20.04.1
5.15.0-1061.67~20.04.1
5.15.0-1062.68~20.04.1
5.15.0-1063.69~20.04.1
5.15.0-1064.70~20.04.1
5.15.0-1065.71~20.04.1
5.15.0-1066.72~20.04.1
5.15.0-1067.73~20.04.1
5.15.0-1068.74~20.04.1
5.15.0-1069.75~20.04.1
5.15.0-1070.76~20.04.1
5.15.0-1071.77~20.04.1
5.15.0-1072.78~20.04.1
5.15.0-1073.79~20.04.1
5.15.0-1075.82~20.04.1
5.15.0-1077.84~20.04.1
5.15.0-1080.87~20.04.1
5.15.0-1081.88~20.04.1
5.15.0-1082.89~20.04.1
5.15.0-1083.90~20.04.1
5.15.0-1084.91~20.04.1
5.15.0-1086.93~20.04.1
5.15.0-1087.94~20.04.1
5.15.0-1088.95~20.04.1
5.15.0-1089.96~20.04.1
5.15.0-1090.97~20.04.1
5.15.0-1091.98~20.04.1
5.15.0-1092.99~20.04.1
5.15.0-1093.100~20.04.1
5.15.0-1095.102~20.04.1
5.15.0-1096.103~20.04.1
5.15.0-1097.104~20.04.1
5.15.0-1098.105~20.04.1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "5.15.0-1099.106~20.04.1",
            "binary_name": "linux-aws-5.15-cloud-tools-5.15.0-1099"
        },
        {
            "binary_version": "5.15.0-1099.106~20.04.1",
            "binary_name": "linux-aws-5.15-headers-5.15.0-1099"
        },
        {
            "binary_version": "5.15.0-1099.106~20.04.1",
            "binary_name": "linux-aws-5.15-tools-5.15.0-1099"
        },
        {
            "binary_version": "5.15.0-1099.106~20.04.1",
            "binary_name": "linux-buildinfo-5.15.0-1099-aws"
        },
        {
            "binary_version": "5.15.0-1099.106~20.04.1",
            "binary_name": "linux-cloud-tools-5.15.0-1099-aws"
        },
        {
            "binary_version": "5.15.0-1099.106~20.04.1",
            "binary_name": "linux-headers-5.15.0-1099-aws"
        },
        {
            "binary_version": "5.15.0-1099.106~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-1099-aws"
        },
        {
            "binary_version": "5.15.0-1099.106~20.04.1",
            "binary_name": "linux-modules-5.15.0-1099-aws"
        },
        {
            "binary_version": "5.15.0-1099.106~20.04.1",
            "binary_name": "linux-modules-extra-5.15.0-1099-aws"
        },
        {
            "binary_version": "5.15.0-1099.106~20.04.1",
            "binary_name": "linux-tools-5.15.0-1099-aws"
        }
    ]
}

Database specific

cves_map
{
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-38561"
        },
        {
            "severity": [
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-40019"
        }
    ],
    "ecosystem": "Ubuntu:Pro:20.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8013-4.json"

Ubuntu:Pro:20.04:LTS / linux-gcp-5.15

Package

Name
linux-gcp-5.15
Purl
pkg:deb/ubuntu/linux-gcp-5.15@5.15.0-1099.108~20.04.1?arch=source&distro=esm-infra/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1099.108~20.04.1

Affected versions

5.*
5.15.0-1006.9~20.04.1
5.15.0-1012.17~20.04.1
5.15.0-1013.18~20.04.1
5.15.0-1016.21~20.04.1
5.15.0-1017.23~20.04.2
5.15.0-1018.24~20.04.1
5.15.0-1021.28~20.04.1
5.15.0-1022.29~20.04.1
5.15.0-1025.32~20.04.2
5.15.0-1026.33~20.04.1
5.15.0-1027.34~20.04.1
5.15.0-1029.36~20.04.1
5.15.0-1030.37~20.04.1
5.15.0-1031.38~20.04.1
5.15.0-1032.40~20.04.1
5.15.0-1033.41~20.04.1
5.15.0-1034.42~20.04.1
5.15.0-1035.43~20.04.1
5.15.0-1036.44~20.04.1
5.15.0-1037.45~20.04.1
5.15.0-1038.46~20.04.1
5.15.0-1039.47~20.04.1
5.15.0-1040.48~20.04.1
5.15.0-1041.49~20.04.1
5.15.0-1042.50~20.04.1
5.15.0-1044.52~20.04.1
5.15.0-1045.53~20.04.2
5.15.0-1046.54~20.04.1
5.15.0-1047.55~20.04.1
5.15.0-1048.56~20.04.1
5.15.0-1049.57~20.04.1
5.15.0-1051.59~20.04.1
5.15.0-1052.60~20.04.1
5.15.0-1053.61~20.04.1
5.15.0-1054.62~20.04.1
5.15.0-1055.63~20.04.1
5.15.0-1058.66~20.04.1
5.15.0-1059.67~20.04.1
5.15.0-1060.68~20.04.1
5.15.0-1062.70~20.04.1
5.15.0-1065.73~20.04.1
5.15.0-1066.74~20.04.1
5.15.0-1067.75~20.04.1
5.15.0-1068.76~20.04.1
5.15.0-1069.77~20.04.1
5.15.0-1070.78~20.04.1
5.15.0-1071.79~20.04.1
5.15.0-1072.80~20.04.1
5.15.0-1073.81~20.04.1
5.15.0-1074.83~20.04.1
5.15.0-1075.84~20.04.1
5.15.0-1077.86~20.04.1
5.15.0-1078.87~20.04.1
5.15.0-1081.90~20.04.1
5.15.0-1083.92~20.04.1
5.15.0-1085.94~20.04.1
5.15.0-1086.95~20.04.1
5.15.0-1087.96~20.04.2
5.15.0-1088.97~20.04.1
5.15.0-1090.99~20.04.1
5.15.0-1091.100~20.04.1
5.15.0-1092.101~20.04.1
5.15.0-1093.102~20.04.1
5.15.0-1095.104~20.04.1
5.15.0-1096.105~20.04.1
5.15.0-1097.106~20.04.1
5.15.0-1098.107~20.04.1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "5.15.0-1099.108~20.04.1",
            "binary_name": "linux-buildinfo-5.15.0-1099-gcp"
        },
        {
            "binary_version": "5.15.0-1099.108~20.04.1",
            "binary_name": "linux-gcp-5.15-headers-5.15.0-1099"
        },
        {
            "binary_version": "5.15.0-1099.108~20.04.1",
            "binary_name": "linux-gcp-5.15-tools-5.15.0-1099"
        },
        {
            "binary_version": "5.15.0-1099.108~20.04.1",
            "binary_name": "linux-headers-5.15.0-1099-gcp"
        },
        {
            "binary_version": "5.15.0-1099.108~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-1099-gcp"
        },
        {
            "binary_version": "5.15.0-1099.108~20.04.1",
            "binary_name": "linux-modules-5.15.0-1099-gcp"
        },
        {
            "binary_version": "5.15.0-1099.108~20.04.1",
            "binary_name": "linux-modules-extra-5.15.0-1099-gcp"
        },
        {
            "binary_version": "5.15.0-1099.108~20.04.1",
            "binary_name": "linux-modules-iwlwifi-5.15.0-1099-gcp"
        },
        {
            "binary_version": "5.15.0-1099.108~20.04.1",
            "binary_name": "linux-tools-5.15.0-1099-gcp"
        }
    ]
}

Database specific

cves_map
{
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-38561"
        },
        {
            "severity": [
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-40019"
        }
    ],
    "ecosystem": "Ubuntu:Pro:20.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8013-4.json"

Ubuntu:Pro:20.04:LTS / linux-oracle-5.15

Package

Name
linux-oracle-5.15
Purl
pkg:deb/ubuntu/linux-oracle-5.15@5.15.0-1096.102~20.04.1?arch=source&distro=esm-infra/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1096.102~20.04.1

Affected versions

5.*
5.15.0-1007.9~20.04.1
5.15.0-1013.17~20.04.1
5.15.0-1016.20~20.04.1
5.15.0-1017.22~20.04.1
5.15.0-1018.23~20.04.1
5.15.0-1019.24~20.04.1
5.15.0-1021.27~20.04.1
5.15.0-1022.28~20.04.1
5.15.0-1025.31~20.04.2
5.15.0-1027.33~20.04.1
5.15.0-1029.35~20.04.1
5.15.0-1030.36~20.04.1
5.15.0-1032.38~20.04.1
5.15.0-1033.39~20.04.1
5.15.0-1034.40~20.04.1
5.15.0-1035.41~20.04.1
5.15.0-1036.42~20.04.1
5.15.0-1037.43~20.04.1
5.15.0-1038.44~20.04.1
5.15.0-1039.45~20.04.1
5.15.0-1040.46~20.04.1
5.15.0-1041.47~20.04.1
5.15.0-1042.48~20.04.1
5.15.0-1044.50~20.04.1
5.15.0-1045.51~20.04.1
5.15.0-1046.52~20.04.1
5.15.0-1047.53~20.04.1
5.15.0-1048.54~20.04.1
5.15.0-1049.55~20.04.1
5.15.0-1050.56~20.04.1
5.15.0-1051.57~20.04.1
5.15.0-1052.58~20.04.1
5.15.0-1053.59~20.04.1
5.15.0-1054.60~20.04.1
5.15.0-1055.61~20.04.1
5.15.0-1058.64~20.04.1
5.15.0-1059.65~20.04.1
5.15.0-1061.67~20.04.1
5.15.0-1062.68~20.04.1
5.15.0-1063.69~20.04.1
5.15.0-1065.71~20.04.1
5.15.0-1066.72~20.04.1
5.15.0-1067.73~20.04.1
5.15.0-1068.74~20.04.1
5.15.0-1069.75~20.04.1
5.15.0-1070.76~20.04.1
5.15.0-1071.77~20.04.1
5.15.0-1072.78~20.04.1
5.15.0-1073.79~20.04.1
5.15.0-1074.80~20.04.1
5.15.0-1075.81~20.04.1
5.15.0-1076.82~20.04.1
5.15.0-1077.83~20.04.1
5.15.0-1078.84~20.04.1
5.15.0-1079.85~20.04.1
5.15.0-1080.86~20.04.1
5.15.0-1081.87~20.04.1
5.15.0-1083.89~20.04.1
5.15.0-1084.90~20.04.1
5.15.0-1085.91~20.04.3
5.15.0-1086.92~20.04.1
5.15.0-1088.94~20.04.1
5.15.0-1090.96~20.04.1
5.15.0-1091.97~20.04.1
5.15.0-1092.98~20.04.1
5.15.0-1093.99~20.04.1
5.15.0-1094.100~20.04.1
5.15.0-1095.101~20.04.1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "5.15.0-1096.102~20.04.1",
            "binary_name": "linux-buildinfo-5.15.0-1096-oracle"
        },
        {
            "binary_version": "5.15.0-1096.102~20.04.1",
            "binary_name": "linux-headers-5.15.0-1096-oracle"
        },
        {
            "binary_version": "5.15.0-1096.102~20.04.1",
            "binary_name": "linux-image-unsigned-5.15.0-1096-oracle"
        },
        {
            "binary_version": "5.15.0-1096.102~20.04.1",
            "binary_name": "linux-modules-5.15.0-1096-oracle"
        },
        {
            "binary_version": "5.15.0-1096.102~20.04.1",
            "binary_name": "linux-modules-extra-5.15.0-1096-oracle"
        },
        {
            "binary_version": "5.15.0-1096.102~20.04.1",
            "binary_name": "linux-oracle-5.15-headers-5.15.0-1096"
        },
        {
            "binary_version": "5.15.0-1096.102~20.04.1",
            "binary_name": "linux-oracle-5.15-tools-5.15.0-1096"
        },
        {
            "binary_version": "5.15.0-1096.102~20.04.1",
            "binary_name": "linux-tools-5.15.0-1096-oracle"
        }
    ]
}

Database specific

cves_map
{
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-38561"
        },
        {
            "severity": [
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-40019"
        }
    ],
    "ecosystem": "Ubuntu:Pro:20.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8013-4.json"

Ubuntu:22.04:LTS / linux-nvidia-tegra-igx

Package

Name
linux-nvidia-tegra-igx
Purl
pkg:deb/ubuntu/linux-nvidia-tegra-igx@5.15.0-1040.40?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1040.40

Affected versions

5.*
5.15.0-1001.1
5.15.0-1002.2
5.15.0-1004.4
5.15.0-1005.5
5.15.0-1006.6
5.15.0-1007.7
5.15.0-1008.8
5.15.0-1009.9
5.15.0-1012.12
5.15.0-1013.13
5.15.0-1015.15
5.15.0-1016.16
5.15.0-1018.18
5.15.0-1019.19
5.15.0-1020.20
5.15.0-1021.21
5.15.0-1022.22
5.15.0-1023.23
5.15.0-1024.24
5.15.0-1026.26
5.15.0-1027.27
5.15.0-1028.28
5.15.0-1029.29
5.15.0-1030.30
5.15.0-1031.31
5.15.0-1032.32
5.15.0-1033.33
5.15.0-1034.34
5.15.0-1035.35
5.15.0-1036.36
5.15.0-1037.37
5.15.0-1038.38
5.15.0-1039.39

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "5.15.0-1040.40",
            "binary_name": "linux-buildinfo-5.15.0-1040-nvidia-tegra-igx"
        },
        {
            "binary_version": "5.15.0-1040.40",
            "binary_name": "linux-buildinfo-5.15.0-1040-nvidia-tegra-igx-rt"
        },
        {
            "binary_version": "5.15.0-1040.40",
            "binary_name": "linux-headers-5.15.0-1040-nvidia-tegra-igx"
        },
        {
            "binary_version": "5.15.0-1040.40",
            "binary_name": "linux-headers-5.15.0-1040-nvidia-tegra-igx-rt"
        },
        {
            "binary_version": "5.15.0-1040.40",
            "binary_name": "linux-image-unsigned-5.15.0-1040-nvidia-tegra-igx"
        },
        {
            "binary_version": "5.15.0-1040.40",
            "binary_name": "linux-image-unsigned-5.15.0-1040-nvidia-tegra-igx-rt"
        },
        {
            "binary_version": "5.15.0-1040.40",
            "binary_name": "linux-modules-5.15.0-1040-nvidia-tegra-igx"
        },
        {
            "binary_version": "5.15.0-1040.40",
            "binary_name": "linux-modules-5.15.0-1040-nvidia-tegra-igx-rt"
        },
        {
            "binary_version": "5.15.0-1040.40",
            "binary_name": "linux-modules-extra-5.15.0-1040-nvidia-tegra-igx"
        },
        {
            "binary_version": "5.15.0-1040.40",
            "binary_name": "linux-nvidia-tegra-igx-headers-5.15.0-1040"
        },
        {
            "binary_version": "5.15.0-1040.40",
            "binary_name": "linux-nvidia-tegra-igx-tools-5.15.0-1040"
        },
        {
            "binary_version": "5.15.0-1040.40",
            "binary_name": "linux-tools-5.15.0-1040-nvidia-tegra-igx"
        },
        {
            "binary_version": "5.15.0-1040.40",
            "binary_name": "linux-tools-5.15.0-1040-nvidia-tegra-igx-rt"
        }
    ]
}

Database specific

cves_map
{
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-38561"
        },
        {
            "severity": [
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-40019"
        }
    ],
    "ecosystem": "Ubuntu:22.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8013-4.json"

Ubuntu:22.04:LTS / linux-xilinx-zynqmp

Package

Name
linux-xilinx-zynqmp
Purl
pkg:deb/ubuntu/linux-xilinx-zynqmp@5.15.0-1063.67?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1063.67

Affected versions

5.*
5.15.0-1022.26
5.15.0-1023.27
5.15.0-1025.29
5.15.0-1027.31
5.15.0-1030.34
5.15.0-1031.35
5.15.0-1035.39
5.15.0-1036.40
5.15.0-1037.41
5.15.0-1038.42
5.15.0-1039.43
5.15.0-1041.45
5.15.0-1044.48
5.15.0-1046.50
5.15.0-1050.54
5.15.0-1051.55
5.15.0-1052.56
5.15.0-1053.57
5.15.0-1054.58
5.15.0-1055.59
5.15.0-1056.60
5.15.0-1057.61
5.15.0-1059.63
5.15.0-1060.64
5.15.0-1061.65
5.15.0-1062.66

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "5.15.0-1063.67",
            "binary_name": "linux-buildinfo-5.15.0-1063-xilinx-zynqmp"
        },
        {
            "binary_version": "5.15.0-1063.67",
            "binary_name": "linux-headers-5.15.0-1063-xilinx-zynqmp"
        },
        {
            "binary_version": "5.15.0-1063.67",
            "binary_name": "linux-image-5.15.0-1063-xilinx-zynqmp"
        },
        {
            "binary_version": "5.15.0-1063.67",
            "binary_name": "linux-modules-5.15.0-1063-xilinx-zynqmp"
        },
        {
            "binary_version": "5.15.0-1063.67",
            "binary_name": "linux-tools-5.15.0-1063-xilinx-zynqmp"
        },
        {
            "binary_version": "5.15.0-1063.67",
            "binary_name": "linux-xilinx-zynqmp-headers-5.15.0-1063"
        },
        {
            "binary_version": "5.15.0-1063.67",
            "binary_name": "linux-xilinx-zynqmp-tools-5.15.0-1063"
        }
    ]
}

Database specific

cves_map
{
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-38561"
        },
        {
            "severity": [
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-40019"
        }
    ],
    "ecosystem": "Ubuntu:22.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8013-4.json"