It was discovered that the network traffic control implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1055)
It was discovered that the IPsec implementation in the Linux kernel did not properly allocate enough memory when performing ESP transformations, leading to a heap-based buffer overflow. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-27666)
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "5.4.0-1071.76~18.04.1",
"binary_name": "linux-aws-5.4-cloud-tools-5.4.0-1071"
},
{
"binary_version": "5.4.0-1071.76~18.04.1",
"binary_name": "linux-aws-5.4-headers-5.4.0-1071"
},
{
"binary_version": "5.4.0-1071.76~18.04.1",
"binary_name": "linux-aws-5.4-tools-5.4.0-1071"
},
{
"binary_version": "5.4.0-1071.76~18.04.1",
"binary_name": "linux-buildinfo-5.4.0-1071-aws"
},
{
"binary_version": "5.4.0-1071.76~18.04.1",
"binary_name": "linux-cloud-tools-5.4.0-1071-aws"
},
{
"binary_version": "5.4.0-1071.76~18.04.1",
"binary_name": "linux-headers-5.4.0-1071-aws"
},
{
"binary_version": "5.4.0-1071.76~18.04.1",
"binary_name": "linux-image-unsigned-5.4.0-1071-aws"
},
{
"binary_version": "5.4.0-1071.76~18.04.1",
"binary_name": "linux-modules-5.4.0-1071-aws"
},
{
"binary_version": "5.4.0-1071.76~18.04.1",
"binary_name": "linux-modules-extra-5.4.0-1071-aws"
},
{
"binary_version": "5.4.0-1071.76~18.04.1",
"binary_name": "linux-tools-5.4.0-1071-aws"
}
]
}{
"ecosystem": "Ubuntu:18.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "5.4.0-1074.77~18.04.1",
"binary_name": "linux-azure-5.4-cloud-tools-5.4.0-1074"
},
{
"binary_version": "5.4.0-1074.77~18.04.1",
"binary_name": "linux-azure-5.4-headers-5.4.0-1074"
},
{
"binary_version": "5.4.0-1074.77~18.04.1",
"binary_name": "linux-azure-5.4-tools-5.4.0-1074"
},
{
"binary_version": "5.4.0-1074.77~18.04.1",
"binary_name": "linux-buildinfo-5.4.0-1074-azure"
},
{
"binary_version": "5.4.0-1074.77~18.04.1",
"binary_name": "linux-cloud-tools-5.4.0-1074-azure"
},
{
"binary_version": "5.4.0-1074.77~18.04.1",
"binary_name": "linux-headers-5.4.0-1074-azure"
},
{
"binary_version": "5.4.0-1074.77~18.04.1",
"binary_name": "linux-image-unsigned-5.4.0-1074-azure"
},
{
"binary_version": "5.4.0-1074.77~18.04.1",
"binary_name": "linux-modules-5.4.0-1074-azure"
},
{
"binary_version": "5.4.0-1074.77~18.04.1",
"binary_name": "linux-modules-extra-5.4.0-1074-azure"
},
{
"binary_version": "5.4.0-1074.77~18.04.1",
"binary_name": "linux-tools-5.4.0-1074-azure"
}
]
}{
"ecosystem": "Ubuntu:18.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "5.4.0-1069.73~18.04.1",
"binary_name": "linux-buildinfo-5.4.0-1069-gcp"
},
{
"binary_version": "5.4.0-1069.73~18.04.1",
"binary_name": "linux-gcp-5.4-headers-5.4.0-1069"
},
{
"binary_version": "5.4.0-1069.73~18.04.1",
"binary_name": "linux-gcp-5.4-tools-5.4.0-1069"
},
{
"binary_version": "5.4.0-1069.73~18.04.1",
"binary_name": "linux-headers-5.4.0-1069-gcp"
},
{
"binary_version": "5.4.0-1069.73~18.04.1",
"binary_name": "linux-image-unsigned-5.4.0-1069-gcp"
},
{
"binary_version": "5.4.0-1069.73~18.04.1",
"binary_name": "linux-modules-5.4.0-1069-gcp"
},
{
"binary_version": "5.4.0-1069.73~18.04.1",
"binary_name": "linux-modules-extra-5.4.0-1069-gcp"
},
{
"binary_version": "5.4.0-1069.73~18.04.1",
"binary_name": "linux-tools-5.4.0-1069-gcp"
}
]
}{
"ecosystem": "Ubuntu:18.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "5.4.0-1067.70~18.04.1",
"binary_name": "linux-buildinfo-5.4.0-1067-gke"
},
{
"binary_version": "5.4.0-1067.70~18.04.1",
"binary_name": "linux-gke-5.4-headers-5.4.0-1067"
},
{
"binary_version": "5.4.0-1067.70~18.04.1",
"binary_name": "linux-gke-5.4-tools-5.4.0-1067"
},
{
"binary_version": "5.4.0-1067.70~18.04.1",
"binary_name": "linux-headers-5.4.0-1067-gke"
},
{
"binary_version": "5.4.0-1067.70~18.04.1",
"binary_name": "linux-image-unsigned-5.4.0-1067-gke"
},
{
"binary_version": "5.4.0-1067.70~18.04.1",
"binary_name": "linux-modules-5.4.0-1067-gke"
},
{
"binary_version": "5.4.0-1067.70~18.04.1",
"binary_name": "linux-modules-extra-5.4.0-1067-gke"
},
{
"binary_version": "5.4.0-1067.70~18.04.1",
"binary_name": "linux-tools-5.4.0-1067-gke"
}
]
}{
"ecosystem": "Ubuntu:18.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "5.4.0-1038.39~18.04.1",
"binary_name": "linux-buildinfo-5.4.0-1038-gkeop"
},
{
"binary_version": "5.4.0-1038.39~18.04.1",
"binary_name": "linux-cloud-tools-5.4.0-1038-gkeop"
},
{
"binary_version": "5.4.0-1038.39~18.04.1",
"binary_name": "linux-gkeop-5.4-cloud-tools-5.4.0-1038"
},
{
"binary_version": "5.4.0-1038.39~18.04.1",
"binary_name": "linux-gkeop-5.4-headers-5.4.0-1038"
},
{
"binary_version": "5.4.0-1038.39~18.04.1",
"binary_name": "linux-gkeop-5.4-source-5.4.0"
},
{
"binary_version": "5.4.0-1038.39~18.04.1",
"binary_name": "linux-gkeop-5.4-tools-5.4.0-1038"
},
{
"binary_version": "5.4.0-1038.39~18.04.1",
"binary_name": "linux-headers-5.4.0-1038-gkeop"
},
{
"binary_version": "5.4.0-1038.39~18.04.1",
"binary_name": "linux-image-unsigned-5.4.0-1038-gkeop"
},
{
"binary_version": "5.4.0-1038.39~18.04.1",
"binary_name": "linux-modules-5.4.0-1038-gkeop"
},
{
"binary_version": "5.4.0-1038.39~18.04.1",
"binary_name": "linux-modules-extra-5.4.0-1038-gkeop"
},
{
"binary_version": "5.4.0-1038.39~18.04.1",
"binary_name": "linux-tools-5.4.0-1038-gkeop"
}
]
}{
"ecosystem": "Ubuntu:18.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "5.4.0-1019.21~18.04.1",
"binary_name": "linux-buildinfo-5.4.0-1019-ibm"
},
{
"binary_version": "5.4.0-1019.21~18.04.1",
"binary_name": "linux-headers-5.4.0-1019-ibm"
},
{
"binary_version": "5.4.0-1019.21~18.04.1",
"binary_name": "linux-ibm-5.4-cloud-tools-common"
},
{
"binary_version": "5.4.0-1019.21~18.04.1",
"binary_name": "linux-ibm-5.4-headers-5.4.0-1019"
},
{
"binary_version": "5.4.0-1019.21~18.04.1",
"binary_name": "linux-ibm-5.4-source-5.4.0"
},
{
"binary_version": "5.4.0-1019.21~18.04.1",
"binary_name": "linux-ibm-5.4-tools-5.4.0-1019"
},
{
"binary_version": "5.4.0-1019.21~18.04.1",
"binary_name": "linux-ibm-5.4-tools-common"
},
{
"binary_version": "5.4.0-1019.21~18.04.1",
"binary_name": "linux-image-unsigned-5.4.0-1019-ibm"
},
{
"binary_version": "5.4.0-1019.21~18.04.1",
"binary_name": "linux-modules-5.4.0-1019-ibm"
},
{
"binary_version": "5.4.0-1019.21~18.04.1",
"binary_name": "linux-modules-extra-5.4.0-1019-ibm"
},
{
"binary_version": "5.4.0-1019.21~18.04.1",
"binary_name": "linux-tools-5.4.0-1019-ibm"
}
]
}{
"ecosystem": "Ubuntu:18.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "5.4.0-1058.65~18.04.1",
"binary_name": "linux-buildinfo-5.4.0-1058-raspi"
},
{
"binary_version": "5.4.0-1058.65~18.04.1",
"binary_name": "linux-headers-5.4.0-1058-raspi"
},
{
"binary_version": "5.4.0-1058.65~18.04.1",
"binary_name": "linux-image-5.4.0-1058-raspi"
},
{
"binary_version": "5.4.0-1058.65~18.04.1",
"binary_name": "linux-modules-5.4.0-1058-raspi"
},
{
"binary_version": "5.4.0-1058.65~18.04.1",
"binary_name": "linux-raspi-5.4-headers-5.4.0-1058"
},
{
"binary_version": "5.4.0-1058.65~18.04.1",
"binary_name": "linux-raspi-5.4-tools-5.4.0-1058"
},
{
"binary_version": "5.4.0-1058.65~18.04.1",
"binary_name": "linux-tools-5.4.0-1058-raspi"
}
]
}{
"ecosystem": "Ubuntu:18.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "5.13.0-1021.23~20.04.2",
"binary_name": "linux-aws-5.13-cloud-tools-5.13.0-1021"
},
{
"binary_version": "5.13.0-1021.23~20.04.2",
"binary_name": "linux-aws-5.13-headers-5.13.0-1021"
},
{
"binary_version": "5.13.0-1021.23~20.04.2",
"binary_name": "linux-aws-5.13-tools-5.13.0-1021"
},
{
"binary_version": "5.13.0-1021.23~20.04.2",
"binary_name": "linux-buildinfo-5.13.0-1021-aws"
},
{
"binary_version": "5.13.0-1021.23~20.04.2",
"binary_name": "linux-cloud-tools-5.13.0-1021-aws"
},
{
"binary_version": "5.13.0-1021.23~20.04.2",
"binary_name": "linux-headers-5.13.0-1021-aws"
},
{
"binary_version": "5.13.0-1021.23~20.04.2",
"binary_name": "linux-image-unsigned-5.13.0-1021-aws"
},
{
"binary_version": "5.13.0-1021.23~20.04.2",
"binary_name": "linux-modules-5.13.0-1021-aws"
},
{
"binary_version": "5.13.0-1021.23~20.04.2",
"binary_name": "linux-modules-extra-5.13.0-1021-aws"
},
{
"binary_version": "5.13.0-1021.23~20.04.2",
"binary_name": "linux-tools-5.13.0-1021-aws"
}
]
}{
"ecosystem": "Ubuntu:20.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "5.4.0-1074.77+cvm1.1",
"binary_name": "linux-image-unsigned-5.4.0-1074-azure-fde"
}
]
}{
"ecosystem": "Ubuntu:20.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "5.4.0-1069.73",
"binary_name": "linux-buildinfo-5.4.0-1069-gcp"
},
{
"binary_version": "5.4.0-1069.73",
"binary_name": "linux-gcp-headers-5.4.0-1069"
},
{
"binary_version": "5.4.0-1069.73",
"binary_name": "linux-gcp-tools-5.4.0-1069"
},
{
"binary_version": "5.4.0-1069.73",
"binary_name": "linux-headers-5.4.0-1069-gcp"
},
{
"binary_version": "5.4.0-1069.73",
"binary_name": "linux-image-unsigned-5.4.0-1069-gcp"
},
{
"binary_version": "5.4.0-1069.73",
"binary_name": "linux-modules-5.4.0-1069-gcp"
},
{
"binary_version": "5.4.0-1069.73",
"binary_name": "linux-modules-extra-5.4.0-1069-gcp"
},
{
"binary_version": "5.4.0-1069.73",
"binary_name": "linux-tools-5.4.0-1069-gcp"
}
]
}{
"ecosystem": "Ubuntu:20.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "5.13.0-1023.28~20.04.1",
"binary_name": "linux-buildinfo-5.13.0-1023-gcp"
},
{
"binary_version": "5.13.0-1023.28~20.04.1",
"binary_name": "linux-gcp-5.13-headers-5.13.0-1023"
},
{
"binary_version": "5.13.0-1023.28~20.04.1",
"binary_name": "linux-gcp-5.13-tools-5.13.0-1023"
},
{
"binary_version": "5.13.0-1023.28~20.04.1",
"binary_name": "linux-headers-5.13.0-1023-gcp"
},
{
"binary_version": "5.13.0-1023.28~20.04.1",
"binary_name": "linux-image-unsigned-5.13.0-1023-gcp"
},
{
"binary_version": "5.13.0-1023.28~20.04.1",
"binary_name": "linux-modules-5.13.0-1023-gcp"
},
{
"binary_version": "5.13.0-1023.28~20.04.1",
"binary_name": "linux-modules-extra-5.13.0-1023-gcp"
},
{
"binary_version": "5.13.0-1023.28~20.04.1",
"binary_name": "linux-tools-5.13.0-1023-gcp"
}
]
}{
"ecosystem": "Ubuntu:20.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "5.4.0-1067.70",
"binary_name": "linux-buildinfo-5.4.0-1067-gke"
},
{
"binary_version": "5.4.0-1067.70",
"binary_name": "linux-gke-headers-5.4.0-1067"
},
{
"binary_version": "5.4.0-1067.70",
"binary_name": "linux-gke-tools-5.4.0-1067"
},
{
"binary_version": "5.4.0-1067.70",
"binary_name": "linux-headers-5.4.0-1067-gke"
},
{
"binary_version": "5.4.0-1067.70",
"binary_name": "linux-image-unsigned-5.4.0-1067-gke"
},
{
"binary_version": "5.4.0-1067.70",
"binary_name": "linux-modules-5.4.0-1067-gke"
},
{
"binary_version": "5.4.0-1067.70",
"binary_name": "linux-modules-extra-5.4.0-1067-gke"
},
{
"binary_version": "5.4.0-1067.70",
"binary_name": "linux-tools-5.4.0-1067-gke"
}
]
}{
"ecosystem": "Ubuntu:20.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "5.4.0-1038.39",
"binary_name": "linux-buildinfo-5.4.0-1038-gkeop"
},
{
"binary_version": "5.4.0-1038.39",
"binary_name": "linux-cloud-tools-5.4.0-1038-gkeop"
},
{
"binary_version": "5.4.0-1038.39",
"binary_name": "linux-gkeop-cloud-tools-5.4.0-1038"
},
{
"binary_version": "5.4.0-1038.39",
"binary_name": "linux-gkeop-headers-5.4.0-1038"
},
{
"binary_version": "5.4.0-1038.39",
"binary_name": "linux-gkeop-source-5.4.0"
},
{
"binary_version": "5.4.0-1038.39",
"binary_name": "linux-gkeop-tools-5.4.0-1038"
},
{
"binary_version": "5.4.0-1038.39",
"binary_name": "linux-headers-5.4.0-1038-gkeop"
},
{
"binary_version": "5.4.0-1038.39",
"binary_name": "linux-image-unsigned-5.4.0-1038-gkeop"
},
{
"binary_version": "5.4.0-1038.39",
"binary_name": "linux-modules-5.4.0-1038-gkeop"
},
{
"binary_version": "5.4.0-1038.39",
"binary_name": "linux-modules-extra-5.4.0-1038-gkeop"
},
{
"binary_version": "5.4.0-1038.39",
"binary_name": "linux-tools-5.4.0-1038-gkeop"
}
]
}{
"ecosystem": "Ubuntu:20.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "5.4.0-1019.21",
"binary_name": "linux-buildinfo-5.4.0-1019-ibm"
},
{
"binary_version": "5.4.0-1019.21",
"binary_name": "linux-headers-5.4.0-1019-ibm"
},
{
"binary_version": "5.4.0-1019.21",
"binary_name": "linux-ibm-cloud-tools-common"
},
{
"binary_version": "5.4.0-1019.21",
"binary_name": "linux-ibm-headers-5.4.0-1019"
},
{
"binary_version": "5.4.0-1019.21",
"binary_name": "linux-ibm-source-5.4.0"
},
{
"binary_version": "5.4.0-1019.21",
"binary_name": "linux-ibm-tools-5.4.0-1019"
},
{
"binary_version": "5.4.0-1019.21",
"binary_name": "linux-ibm-tools-common"
},
{
"binary_version": "5.4.0-1019.21",
"binary_name": "linux-image-unsigned-5.4.0-1019-ibm"
},
{
"binary_version": "5.4.0-1019.21",
"binary_name": "linux-modules-5.4.0-1019-ibm"
},
{
"binary_version": "5.4.0-1019.21",
"binary_name": "linux-modules-extra-5.4.0-1019-ibm"
},
{
"binary_version": "5.4.0-1019.21",
"binary_name": "linux-tools-5.4.0-1019-ibm"
}
]
}{
"ecosystem": "Ubuntu:20.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "5.4.0-1058.65",
"binary_name": "linux-buildinfo-5.4.0-1058-raspi"
},
{
"binary_version": "5.4.0-1058.65",
"binary_name": "linux-headers-5.4.0-1058-raspi"
},
{
"binary_version": "5.4.0-1058.65",
"binary_name": "linux-image-5.4.0-1058-raspi"
},
{
"binary_version": "5.4.0-1058.65",
"binary_name": "linux-modules-5.4.0-1058-raspi"
},
{
"binary_version": "5.4.0-1058.65",
"binary_name": "linux-raspi-headers-5.4.0-1058"
},
{
"binary_version": "5.4.0-1058.65",
"binary_name": "linux-raspi-tools-5.4.0-1058"
},
{
"binary_version": "5.4.0-1058.65",
"binary_name": "linux-tools-5.4.0-1058-raspi"
}
]
}{
"ecosystem": "Ubuntu:20.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}