<cvrf:cvrfdoc
  xmlns:vuln="http://www.icasi.org/CVRF/schema/vuln/1.1"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:cvrf-common="http://www.icasi.org/CVRF/schema/common/1.1"
  xmlns:prod="http://www.icasi.org/CVRF/schema/prod/1.1"
  xmlns:scap-core="https://scap.nist.gov/schema/scap-core/1.0"
  xmlns:cvssv2="https://scap.nist.gov/schema/cvss-v2/1.0"
  xmlns:cpe-lang="http://cpe.mitre.org/language/2.0"
  xmlns:sch="http://purl.oclc.org/dsdl/schematron"
  xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <cvrf:DocumentTitle>Mariner Release Notes</cvrf:DocumentTitle>
  <cvrf:DocumentType>Security Update</cvrf:DocumentType>
  <cvrf:DocumentPublisher
    Type="Vendor">
    <cvrf:ContactDetails>secure@microsoft.com</cvrf:ContactDetails>
    <cvrf:IssuingAuthority>The Microsoft Security Response Center (MSRC) identifies, monitors, resolves, and responds to security incidents and Microsoft software security vulnerabilities. For more information, see http://www.microsoft.com/security/msrc.</cvrf:IssuingAuthority>
  </cvrf:DocumentPublisher>
  <cvrf:DocumentTracking>
    <cvrf:Identification>
      <cvrf:ID>2014-Feb</cvrf:ID>
      <cvrf:Alias>2014-Feb</cvrf:Alias>
    </cvrf:Identification>
    <cvrf:Status>Final</cvrf:Status>
    <cvrf:Version>1.0</cvrf:Version>
    <cvrf:RevisionHistory>
      <cvrf:Revision>
        <cvrf:Number>6</cvrf:Number>
        <cvrf:Date>2026-02-18T01:27:51</cvrf:Date>
        <cvrf:Description>Mariner Release Notes</cvrf:Description>
      </cvrf:Revision>
    </cvrf:RevisionHistory>
    <cvrf:InitialReleaseDate>2014-02-02T00:00:00</cvrf:InitialReleaseDate>
    <cvrf:CurrentReleaseDate>2026-02-18T01:27:51</cvrf:CurrentReleaseDate>
  </cvrf:DocumentTracking>
  <cvrf:DocumentNotes>
    <cvrf:Note
      Title="Release Notes"
      Audience="Public"
      Type="Details"
      Ordinal="0">&lt;p&gt;Mariner Release notes&lt;/p&gt;
</cvrf:Note>
    <cvrf:Note
      Title="Legal Disclaimer"
      Audience="Public"
      Type="Legal Disclaimer"
      Ordinal="1">The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.</cvrf:Note>
  </cvrf:DocumentNotes>
  <prod:ProductTree>
    <prod:Branch
      Type="Vendor"
      Name="Microsoft">
      <prod:Branch
        Type="Product Family"
        Name="Mariner">
        <prod:FullProductName
          ProductID="19222-16820">cm1 libtar 1.2.20-8 on CBL Mariner 1.0</prod:FullProductName>
        <prod:FullProductName
          ProductID="19223-16823">cbl2 libtar 1.2.20-8 on CBL Mariner 2.0</prod:FullProductName>
        <prod:FullProductName
          ProductID="18850-17084">azl3 libtar 1.2.20-11 on Azure Linux 3.0</prod:FullProductName>
        <prod:FullProductName
          ProductID="16960-16823">cbl2 kernel 5.15.148.2-2 on CBL Mariner 2.0</prod:FullProductName>
        <prod:FullProductName
          ProductID="17062-17084">azl3 kernel 6.6.29.1-4 on Azure Linux 3.0</prod:FullProductName>
        <prod:FullProductName
          ProductID="17065-17084">azl3 kernel 6.6.35.1-4 on Azure Linux 3.0</prod:FullProductName>
        <prod:FullProductName
          ProductID="19011-16820">cm1 cpio 2.13-3 on CBL Mariner 1.0</prod:FullProductName>
        <prod:FullProductName
          ProductID="19221-16823">cbl2 cpio 2.13-5 on CBL Mariner 2.0</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="Open Source Software">
        <prod:FullProductName
          ProductID="19702-17086">cbl2 kernel 5.15.160.1-1 on CBL Mariner 2.0</prod:FullProductName>
        <prod:FullProductName
          ProductID="19929-17084">azl3 cpio 2.14-1 on Azure Linux 3.0</prod:FullProductName>
      </prod:Branch>
    </prod:Branch>
    <prod:FullProductName
      ProductID="16960-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_kernel_5.15.148.2-2:*:*:*:*:*:*:*:*">cbl2 kernel 5.15.148.2-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17062-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kernel_6.6.29.1-4:*:*:*:*:*:*:*:*">azl3 kernel 6.6.29.1-4 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17065-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kernel_6.6.35.1-4:*:*:*:*:*:*:*:*">azl3 kernel 6.6.35.1-4 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18850-17084"
      CPE="cpe:2.3:a:microsoft:azl3_libtar_1.2.20-11:*:*:*:*:*:*:*:*">azl3 libtar 1.2.20-11 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19011-16820"
      CPE="cpe:2.3:a:microsoft:cm1_cpio_2.13-3:*:*:*:*:*:*:*:*">cm1 cpio 2.13-3 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19221-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_cpio_2.13-5:*:*:*:*:*:*:*:*">cbl2 cpio 2.13-5 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19222-16820"
      CPE="cpe:2.3:a:microsoft:cm1_libtar_1.2.20-8:*:*:*:*:*:*:*:*">cm1 libtar 1.2.20-8 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19223-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_libtar_1.2.20-8:*:*:*:*:*:*:*:*">cbl2 libtar 1.2.20-8 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19702-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_kernel_5.15.160.1-1:*:*:*:*:*:*:*:*">cbl2 kernel 5.15.160.1-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19929-17084"
      CPE="cpe:2.3:a:microsoft:azl3_cpio_2.14-1:*:*:*:*:*:*:*:*">azl3 cpio 2.14-1 on Azure Linux 3.0</prod:FullProductName>
  </prod:ProductTree>
  <vuln:Vulnerability
    Ordinal="1">
    <vuln:Title>Multiple directory traversal vulnerabilities in the (1) tar_extract_glob and (2) tar_extract_all functions in libtar 1.2.20 and earlier allow remote attackers to overwrite arbitrary files via a .. (dot dot) in a crafted tar file.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2013-4420</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19222-16820</vuln:ProductID>
        <vuln:ProductID>19223-16823</vuln:ProductID>
        <vuln:ProductID>18850-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19222-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19223-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18850-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19222-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19223-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18850-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19222-16820</vuln:ProductID>
        <vuln:ProductID>19223-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.2.20-8</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19222-16820</vuln:ProductID>
        <vuln:ProductID>19223-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18850-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.2.20-11</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18850-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2020-08-18T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added libtar to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="2">
    <vuln:Title>The cifs_iovec_write function in fs/cifs/file.c in the Linux kernel through 3.13.5 does not properly handle uncached write operations that copy fewer than the requested number of bytes which allows local users to obtain sensitive information from kernel memory cause a denial of service (memory corruption and system crash) or possibly gain privileges via a writev system call with a crafted pointer.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2014-0069</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16960-16823</vuln:ProductID>
        <vuln:ProductID>17062-17084</vuln:ProductID>
        <vuln:ProductID>19702-17086</vuln:ProductID>
        <vuln:ProductID>17065-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16960-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17062-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19702-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17065-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16960-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17062-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19702-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>17065-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16960-16823</vuln:ProductID>
        <vuln:ProductID>19702-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.148.2-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16960-16823</vuln:ProductID>
        <vuln:ProductID>19702-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17062-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17062-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17065-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.29.1-4</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17065-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-02-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="0">
    <vuln:Title>cpio, as used in build 2007.05.10, 2010.07.28, and possibly other versions, allows remote attackers to overwrite arbitrary files via a symlink within an RPM package archive.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2010-4226</vuln:CVE>
    <vuln:CWE
      ID="CWE-59">Improper Link Resolution Before File Access (&amp;#39;Link Following&amp;#39;)</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19011-16820</vuln:ProductID>
        <vuln:ProductID>19221-16823</vuln:ProductID>
        <vuln:ProductID>19929-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19011-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19221-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19929-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19011-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19221-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19929-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.2</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19011-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.2</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19221-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.2</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19929-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19011-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.13-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19011-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19221-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.13-5</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19221-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T20:26:05</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T01:27:51</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
</cvrf:cvrfdoc>