USN-8101-1

Source
https://ubuntu.com/security/notices/USN-8101-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8101-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-8101-1
Upstream
Related
Published
2026-03-16T22:15:39Z
Modified
2026-03-19T08:43:59.730436Z
Summary
vim vulnerabilities
Details

Rahul Hoysala discovered that Vim did not correctly handle certain tag resolutions. An attacker could possibly use this issue to cause a denial of service. (CVE-2026-25749)

It was discovered that Vim did not correctly handle processing certain specialKey commands. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2026-26269)

Kim Dong Han discovered that Vim did not correctly handle opening certain URLs. If a user or system were tricked into opening a specially crafted file, an attacker could possibly use this issue to execute arbitrary code. (CVE-2026-28417)

Kim Dong Han discovered that Vim did not correctly handle parsing Emacs-style tag files. An attacker could possibly use this issue to cause a denial of service. (CVE-2026-28418, CVE-2026-28419)

Kim Dong Han discovered that Vim did not correctly handle processing maximum combining characters from Unicode supplementary planes. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 25.10. (CVE-2026-28420)

Kim Dong Han discovered that Vim did not correctly handle swap file recovery. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2026-28421)

Kim Dong Han discovered that Vim did not correctly handle rendering status lines. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2026-28422)

References

Affected packages

Ubuntu:22.04:LTS
vim

Package

Name
vim
Purl
pkg:deb/ubuntu/vim@2:8.2.3995-1ubuntu2.26?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:8.2.3995-1ubuntu2.26

Affected versions

2:8.*
2:8.2.2434-3ubuntu3
2:8.2.2434-3ubuntu4
2:8.2.3565-1ubuntu1
2:8.2.3565-1ubuntu2
2:8.2.3565-1ubuntu3
2:8.2.3565-1ubuntu5
2:8.2.3995-1ubuntu1
2:8.2.3995-1ubuntu2
2:8.2.3995-1ubuntu2.1
2:8.2.3995-1ubuntu2.3
2:8.2.3995-1ubuntu2.4
2:8.2.3995-1ubuntu2.5
2:8.2.3995-1ubuntu2.7
2:8.2.3995-1ubuntu2.8
2:8.2.3995-1ubuntu2.9
2:8.2.3995-1ubuntu2.10
2:8.2.3995-1ubuntu2.11
2:8.2.3995-1ubuntu2.12
2:8.2.3995-1ubuntu2.13
2:8.2.3995-1ubuntu2.15
2:8.2.3995-1ubuntu2.16
2:8.2.3995-1ubuntu2.17
2:8.2.3995-1ubuntu2.18
2:8.2.3995-1ubuntu2.19
2:8.2.3995-1ubuntu2.20
2:8.2.3995-1ubuntu2.21
2:8.2.3995-1ubuntu2.22
2:8.2.3995-1ubuntu2.23
2:8.2.3995-1ubuntu2.24

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "vim",
            "binary_version": "2:8.2.3995-1ubuntu2.26"
        },
        {
            "binary_name": "vim-athena",
            "binary_version": "2:8.2.3995-1ubuntu2.26"
        },
        {
            "binary_name": "vim-common",
            "binary_version": "2:8.2.3995-1ubuntu2.26"
        },
        {
            "binary_name": "vim-gtk",
            "binary_version": "2:8.2.3995-1ubuntu2.26"
        },
        {
            "binary_name": "vim-gtk3",
            "binary_version": "2:8.2.3995-1ubuntu2.26"
        },
        {
            "binary_name": "vim-gui-common",
            "binary_version": "2:8.2.3995-1ubuntu2.26"
        },
        {
            "binary_name": "vim-nox",
            "binary_version": "2:8.2.3995-1ubuntu2.26"
        },
        {
            "binary_name": "vim-runtime",
            "binary_version": "2:8.2.3995-1ubuntu2.26"
        },
        {
            "binary_name": "vim-tiny",
            "binary_version": "2:8.2.3995-1ubuntu2.26"
        },
        {
            "binary_name": "xxd",
            "binary_version": "2:8.2.3995-1ubuntu2.26"
        }
    ]
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2026-25749",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-26269",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28417",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28418",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28419",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28420",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28421",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28422",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:22.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8101-1.json"
Ubuntu:24.04:LTS
vim

Package

Name
vim
Purl
pkg:deb/ubuntu/vim@2:9.1.0016-1ubuntu7.10?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:9.1.0016-1ubuntu7.10

Affected versions

2:9.*
2:9.0.1672-1ubuntu2
2:9.0.2087-1ubuntu1
2:9.0.2116-1ubuntu1
2:9.0.2116-1ubuntu2
2:9.0.2184-0ubuntu1
2:9.0.2189-1ubuntu1
2:9.1.0-1ubuntu1
2:9.1.0016-1ubuntu2
2:9.1.0016-1ubuntu6
2:9.1.0016-1ubuntu7
2:9.1.0016-1ubuntu7.1
2:9.1.0016-1ubuntu7.2
2:9.1.0016-1ubuntu7.3
2:9.1.0016-1ubuntu7.4
2:9.1.0016-1ubuntu7.5
2:9.1.0016-1ubuntu7.6
2:9.1.0016-1ubuntu7.7
2:9.1.0016-1ubuntu7.8
2:9.1.0016-1ubuntu7.9

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "vim",
            "binary_version": "2:9.1.0016-1ubuntu7.10"
        },
        {
            "binary_name": "vim-athena",
            "binary_version": "2:9.1.0016-1ubuntu7.10"
        },
        {
            "binary_name": "vim-common",
            "binary_version": "2:9.1.0016-1ubuntu7.10"
        },
        {
            "binary_name": "vim-gtk3",
            "binary_version": "2:9.1.0016-1ubuntu7.10"
        },
        {
            "binary_name": "vim-gui-common",
            "binary_version": "2:9.1.0016-1ubuntu7.10"
        },
        {
            "binary_name": "vim-motif",
            "binary_version": "2:9.1.0016-1ubuntu7.10"
        },
        {
            "binary_name": "vim-nox",
            "binary_version": "2:9.1.0016-1ubuntu7.10"
        },
        {
            "binary_name": "vim-runtime",
            "binary_version": "2:9.1.0016-1ubuntu7.10"
        },
        {
            "binary_name": "vim-tiny",
            "binary_version": "2:9.1.0016-1ubuntu7.10"
        },
        {
            "binary_name": "xxd",
            "binary_version": "2:9.1.0016-1ubuntu7.10"
        }
    ]
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2026-25749",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-26269",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28417",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28418",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28419",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28420",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28421",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28422",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:24.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8101-1.json"
Ubuntu:25.10
vim

Package

Name
vim
Purl
pkg:deb/ubuntu/vim@2:9.1.0967-1ubuntu6.1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:9.1.0967-1ubuntu6.1

Affected versions

2:9.*
2:9.1.0967-1ubuntu4
2:9.1.0967-1ubuntu5
2:9.1.0967-1ubuntu6

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "vim",
            "binary_version": "2:9.1.0967-1ubuntu6.1"
        },
        {
            "binary_name": "vim-athena",
            "binary_version": "2:9.1.0967-1ubuntu6.1"
        },
        {
            "binary_name": "vim-common",
            "binary_version": "2:9.1.0967-1ubuntu6.1"
        },
        {
            "binary_name": "vim-gtk3",
            "binary_version": "2:9.1.0967-1ubuntu6.1"
        },
        {
            "binary_name": "vim-gui-common",
            "binary_version": "2:9.1.0967-1ubuntu6.1"
        },
        {
            "binary_name": "vim-motif",
            "binary_version": "2:9.1.0967-1ubuntu6.1"
        },
        {
            "binary_name": "vim-nox",
            "binary_version": "2:9.1.0967-1ubuntu6.1"
        },
        {
            "binary_name": "vim-runtime",
            "binary_version": "2:9.1.0967-1ubuntu6.1"
        },
        {
            "binary_name": "vim-tiny",
            "binary_version": "2:9.1.0967-1ubuntu6.1"
        },
        {
            "binary_name": "xxd",
            "binary_version": "2:9.1.0967-1ubuntu6.1"
        }
    ]
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2026-25749",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-26269",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28417",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28418",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28419",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28420",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28421",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28422",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:25.10"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8101-1.json"
Ubuntu:Pro:14.04:LTS
vim

Package

Name
vim
Purl
pkg:deb/ubuntu/vim@2:7.4.052-1ubuntu3.1+esm23?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:7.4.052-1ubuntu3.1+esm23

Affected versions

2:7.*
2:7.4.000-1ubuntu2
2:7.4.052-1ubuntu1
2:7.4.052-1ubuntu2
2:7.4.052-1ubuntu3
2:7.4.052-1ubuntu3.1
2:7.4.052-1ubuntu3.1+esm1
2:7.4.052-1ubuntu3.1+esm3
2:7.4.052-1ubuntu3.1+esm4
2:7.4.052-1ubuntu3.1+esm5
2:7.4.052-1ubuntu3.1+esm6
2:7.4.052-1ubuntu3.1+esm7
2:7.4.052-1ubuntu3.1+esm8
2:7.4.052-1ubuntu3.1+esm9
2:7.4.052-1ubuntu3.1+esm10
2:7.4.052-1ubuntu3.1+esm11
2:7.4.052-1ubuntu3.1+esm12
2:7.4.052-1ubuntu3.1+esm13
2:7.4.052-1ubuntu3.1+esm14
2:7.4.052-1ubuntu3.1+esm15
2:7.4.052-1ubuntu3.1+esm16
2:7.4.052-1ubuntu3.1+esm17
2:7.4.052-1ubuntu3.1+esm18
2:7.4.052-1ubuntu3.1+esm19
2:7.4.052-1ubuntu3.1+esm20
2:7.4.052-1ubuntu3.1+esm21
2:7.4.052-1ubuntu3.1+esm22

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_name": "vim",
            "binary_version": "2:7.4.052-1ubuntu3.1+esm23"
        },
        {
            "binary_name": "vim-athena",
            "binary_version": "2:7.4.052-1ubuntu3.1+esm23"
        },
        {
            "binary_name": "vim-common",
            "binary_version": "2:7.4.052-1ubuntu3.1+esm23"
        },
        {
            "binary_name": "vim-gnome",
            "binary_version": "2:7.4.052-1ubuntu3.1+esm23"
        },
        {
            "binary_name": "vim-gtk",
            "binary_version": "2:7.4.052-1ubuntu3.1+esm23"
        },
        {
            "binary_name": "vim-gui-common",
            "binary_version": "2:7.4.052-1ubuntu3.1+esm23"
        },
        {
            "binary_name": "vim-lesstif",
            "binary_version": "2:7.4.052-1ubuntu3.1+esm23"
        },
        {
            "binary_name": "vim-nox",
            "binary_version": "2:7.4.052-1ubuntu3.1+esm23"
        },
        {
            "binary_name": "vim-runtime",
            "binary_version": "2:7.4.052-1ubuntu3.1+esm23"
        },
        {
            "binary_name": "vim-tiny",
            "binary_version": "2:7.4.052-1ubuntu3.1+esm23"
        }
    ]
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2026-25749",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-26269",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28417",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28418",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28419",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28420",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28421",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28422",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:Pro:14.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8101-1.json"
Ubuntu:Pro:16.04:LTS
vim

Package

Name
vim
Purl
pkg:deb/ubuntu/vim@2:7.4.1689-3ubuntu1.5+esm29?arch=source&distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:7.4.1689-3ubuntu1.5+esm29

Affected versions

2:7.*
2:7.4.712-2ubuntu4
2:7.4.826-1ubuntu1
2:7.4.826-1ubuntu2
2:7.4.826-1ubuntu3
2:7.4.963-1ubuntu1
2:7.4.963-1ubuntu4
2:7.4.963-1ubuntu5
2:7.4.1689-3ubuntu1
2:7.4.1689-3ubuntu1.1
2:7.4.1689-3ubuntu1.2
2:7.4.1689-3ubuntu1.3
2:7.4.1689-3ubuntu1.4
2:7.4.1689-3ubuntu1.5
2:7.4.1689-3ubuntu1.5+esm2
2:7.4.1689-3ubuntu1.5+esm3
2:7.4.1689-3ubuntu1.5+esm4
2:7.4.1689-3ubuntu1.5+esm5
2:7.4.1689-3ubuntu1.5+esm6
2:7.4.1689-3ubuntu1.5+esm7
2:7.4.1689-3ubuntu1.5+esm8
2:7.4.1689-3ubuntu1.5+esm10
2:7.4.1689-3ubuntu1.5+esm11
2:7.4.1689-3ubuntu1.5+esm12
2:7.4.1689-3ubuntu1.5+esm13
2:7.4.1689-3ubuntu1.5+esm14
2:7.4.1689-3ubuntu1.5+esm15
2:7.4.1689-3ubuntu1.5+esm17
2:7.4.1689-3ubuntu1.5+esm18
2:7.4.1689-3ubuntu1.5+esm19
2:7.4.1689-3ubuntu1.5+esm20
2:7.4.1689-3ubuntu1.5+esm22
2:7.4.1689-3ubuntu1.5+esm23
2:7.4.1689-3ubuntu1.5+esm24
2:7.4.1689-3ubuntu1.5+esm25
2:7.4.1689-3ubuntu1.5+esm26
2:7.4.1689-3ubuntu1.5+esm27
2:7.4.1689-3ubuntu1.5+esm28

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_name": "vim",
            "binary_version": "2:7.4.1689-3ubuntu1.5+esm29"
        },
        {
            "binary_name": "vim-athena",
            "binary_version": "2:7.4.1689-3ubuntu1.5+esm29"
        },
        {
            "binary_name": "vim-athena-py2",
            "binary_version": "2:7.4.1689-3ubuntu1.5+esm29"
        },
        {
            "binary_name": "vim-common",
            "binary_version": "2:7.4.1689-3ubuntu1.5+esm29"
        },
        {
            "binary_name": "vim-gnome",
            "binary_version": "2:7.4.1689-3ubuntu1.5+esm29"
        },
        {
            "binary_name": "vim-gnome-py2",
            "binary_version": "2:7.4.1689-3ubuntu1.5+esm29"
        },
        {
            "binary_name": "vim-gtk",
            "binary_version": "2:7.4.1689-3ubuntu1.5+esm29"
        },
        {
            "binary_name": "vim-gtk-py2",
            "binary_version": "2:7.4.1689-3ubuntu1.5+esm29"
        },
        {
            "binary_name": "vim-gtk3",
            "binary_version": "2:7.4.1689-3ubuntu1.5+esm29"
        },
        {
            "binary_name": "vim-gtk3-py2",
            "binary_version": "2:7.4.1689-3ubuntu1.5+esm29"
        },
        {
            "binary_name": "vim-gui-common",
            "binary_version": "2:7.4.1689-3ubuntu1.5+esm29"
        },
        {
            "binary_name": "vim-nox",
            "binary_version": "2:7.4.1689-3ubuntu1.5+esm29"
        },
        {
            "binary_name": "vim-nox-py2",
            "binary_version": "2:7.4.1689-3ubuntu1.5+esm29"
        },
        {
            "binary_name": "vim-runtime",
            "binary_version": "2:7.4.1689-3ubuntu1.5+esm29"
        },
        {
            "binary_name": "vim-tiny",
            "binary_version": "2:7.4.1689-3ubuntu1.5+esm29"
        }
    ]
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2026-25749",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-26269",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28417",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28418",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28419",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28420",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28421",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28422",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:Pro:16.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8101-1.json"
Ubuntu:Pro:18.04:LTS
vim

Package

Name
vim
Purl
pkg:deb/ubuntu/vim@2:8.0.1453-1ubuntu1.13+esm14?arch=source&distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:8.0.1453-1ubuntu1.13+esm14

Affected versions

2:8.*
2:8.0.0197-4ubuntu5
2:8.0.1144-1ubuntu1
2:8.0.1401-1ubuntu1
2:8.0.1401-1ubuntu2
2:8.0.1401-1ubuntu3
2:8.0.1453-1ubuntu1
2:8.0.1453-1ubuntu1.1
2:8.0.1453-1ubuntu1.3
2:8.0.1453-1ubuntu1.4
2:8.0.1453-1ubuntu1.6
2:8.0.1453-1ubuntu1.7
2:8.0.1453-1ubuntu1.8
2:8.0.1453-1ubuntu1.9
2:8.0.1453-1ubuntu1.10
2:8.0.1453-1ubuntu1.11
2:8.0.1453-1ubuntu1.12
2:8.0.1453-1ubuntu1.13
2:8.0.1453-1ubuntu1.13+esm1
2:8.0.1453-1ubuntu1.13+esm3
2:8.0.1453-1ubuntu1.13+esm4
2:8.0.1453-1ubuntu1.13+esm5
2:8.0.1453-1ubuntu1.13+esm6
2:8.0.1453-1ubuntu1.13+esm7
2:8.0.1453-1ubuntu1.13+esm8
2:8.0.1453-1ubuntu1.13+esm9
2:8.0.1453-1ubuntu1.13+esm10
2:8.0.1453-1ubuntu1.13+esm11
2:8.0.1453-1ubuntu1.13+esm12
2:8.0.1453-1ubuntu1.13+esm13

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_name": "vim",
            "binary_version": "2:8.0.1453-1ubuntu1.13+esm14"
        },
        {
            "binary_name": "vim-athena",
            "binary_version": "2:8.0.1453-1ubuntu1.13+esm14"
        },
        {
            "binary_name": "vim-common",
            "binary_version": "2:8.0.1453-1ubuntu1.13+esm14"
        },
        {
            "binary_name": "vim-gnome",
            "binary_version": "2:8.0.1453-1ubuntu1.13+esm14"
        },
        {
            "binary_name": "vim-gtk",
            "binary_version": "2:8.0.1453-1ubuntu1.13+esm14"
        },
        {
            "binary_name": "vim-gtk3",
            "binary_version": "2:8.0.1453-1ubuntu1.13+esm14"
        },
        {
            "binary_name": "vim-gui-common",
            "binary_version": "2:8.0.1453-1ubuntu1.13+esm14"
        },
        {
            "binary_name": "vim-nox",
            "binary_version": "2:8.0.1453-1ubuntu1.13+esm14"
        },
        {
            "binary_name": "vim-runtime",
            "binary_version": "2:8.0.1453-1ubuntu1.13+esm14"
        },
        {
            "binary_name": "vim-tiny",
            "binary_version": "2:8.0.1453-1ubuntu1.13+esm14"
        },
        {
            "binary_name": "xxd",
            "binary_version": "2:8.0.1453-1ubuntu1.13+esm14"
        }
    ]
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2026-25749",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-26269",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28417",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28418",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28419",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28420",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28421",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28422",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:Pro:18.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8101-1.json"
Ubuntu:Pro:20.04:LTS
vim

Package

Name
vim
Purl
pkg:deb/ubuntu/vim@2:8.1.2269-1ubuntu5.32+esm2?arch=source&distro=esm-infra/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:8.1.2269-1ubuntu5.32+esm2

Affected versions

2:8.*
2:8.1.0875-5ubuntu2
2:8.1.0875-5ubuntu3
2:8.1.0875-5ubuntu4
2:8.1.2269-1ubuntu1
2:8.1.2269-1ubuntu4
2:8.1.2269-1ubuntu5
2:8.1.2269-1ubuntu5.3
2:8.1.2269-1ubuntu5.4
2:8.1.2269-1ubuntu5.6
2:8.1.2269-1ubuntu5.7
2:8.1.2269-1ubuntu5.8
2:8.1.2269-1ubuntu5.9
2:8.1.2269-1ubuntu5.11
2:8.1.2269-1ubuntu5.12
2:8.1.2269-1ubuntu5.13
2:8.1.2269-1ubuntu5.14
2:8.1.2269-1ubuntu5.15
2:8.1.2269-1ubuntu5.16
2:8.1.2269-1ubuntu5.17
2:8.1.2269-1ubuntu5.18
2:8.1.2269-1ubuntu5.20
2:8.1.2269-1ubuntu5.21
2:8.1.2269-1ubuntu5.22
2:8.1.2269-1ubuntu5.23
2:8.1.2269-1ubuntu5.24
2:8.1.2269-1ubuntu5.25
2:8.1.2269-1ubuntu5.26
2:8.1.2269-1ubuntu5.29
2:8.1.2269-1ubuntu5.30
2:8.1.2269-1ubuntu5.31
2:8.1.2269-1ubuntu5.32

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_name": "vim",
            "binary_version": "2:8.1.2269-1ubuntu5.32+esm2"
        },
        {
            "binary_name": "vim-athena",
            "binary_version": "2:8.1.2269-1ubuntu5.32+esm2"
        },
        {
            "binary_name": "vim-common",
            "binary_version": "2:8.1.2269-1ubuntu5.32+esm2"
        },
        {
            "binary_name": "vim-gtk",
            "binary_version": "2:8.1.2269-1ubuntu5.32+esm2"
        },
        {
            "binary_name": "vim-gtk3",
            "binary_version": "2:8.1.2269-1ubuntu5.32+esm2"
        },
        {
            "binary_name": "vim-gui-common",
            "binary_version": "2:8.1.2269-1ubuntu5.32+esm2"
        },
        {
            "binary_name": "vim-nox",
            "binary_version": "2:8.1.2269-1ubuntu5.32+esm2"
        },
        {
            "binary_name": "vim-runtime",
            "binary_version": "2:8.1.2269-1ubuntu5.32+esm2"
        },
        {
            "binary_name": "vim-tiny",
            "binary_version": "2:8.1.2269-1ubuntu5.32+esm2"
        },
        {
            "binary_name": "xxd",
            "binary_version": "2:8.1.2269-1ubuntu5.32+esm2"
        }
    ]
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2026-25749",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-26269",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "low",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28417",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28418",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28419",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28420",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28421",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2026-28422",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:Pro:20.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8101-1.json"