It was discovered that the SUNRPC RDMA protocol implementation in the Linux kernel did not properly calculate the header size of a RPC message payload. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-0812)
Moshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation in the Linux kernel did not provide sufficient randomization when calculating port offsets. An attacker could possibly use this to expose sensitive information. (CVE-2022-1012, CVE-2022-32296)
Duoming Zhou discovered that race conditions existed in the timer handling implementation of the Linux kernel's Rose X.25 protocol layer, resulting in use-after-free vulnerabilities. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-2318)
Roger Pau Monné discovered that the Xen virtual block driver in the Linux kernel did not properly initialize memory pages to be used for shared communication with the backend. A local attacker could use this to expose sensitive information (guest kernel memory). (CVE-2022-26365)
Roger Pau Monné discovered that the Xen paravirtualization frontend in the Linux kernel did not properly initialize memory pages to be used for shared communication with the backend. A local attacker could use this to expose sensitive information (guest kernel memory). (CVE-2022-33740)
It was discovered that the Xen paravirtualization frontend in the Linux kernel incorrectly shared unrelated data when communicating with certain backends. A local attacker could use this to cause a denial of service (guest crash) or expose sensitive information (guest kernel memory). (CVE-2022-33741, CVE-2022-33742)
Oleksandr Tyshchenko discovered that the Xen paravirtualization platform in the Linux kernel on ARM platforms contained a race condition in certain situations. An attacker in a guest VM could use this to cause a denial of service in the host OS. (CVE-2022-33744)
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "4.15.0-194.205",
"binary_name": "block-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "block-modules-4.15.0-194-generic-lpae-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "crypto-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "crypto-modules-4.15.0-194-generic-lpae-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "dasd-extra-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "dasd-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "fat-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "fat-modules-4.15.0-194-generic-lpae-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "fb-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "firewire-core-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "floppy-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "fs-core-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "fs-core-modules-4.15.0-194-generic-lpae-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "fs-secondary-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "fs-secondary-modules-4.15.0-194-generic-lpae-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "input-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "input-modules-4.15.0-194-generic-lpae-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "ipmi-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "ipmi-modules-4.15.0-194-generic-lpae-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "irda-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "irda-modules-4.15.0-194-generic-lpae-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "kernel-image-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "kernel-image-4.15.0-194-generic-lpae-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-buildinfo-4.15.0-194-generic"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-buildinfo-4.15.0-194-generic-lpae"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-buildinfo-4.15.0-194-lowlatency"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-cloud-tools-4.15.0-194"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-cloud-tools-4.15.0-194-generic"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-cloud-tools-4.15.0-194-lowlatency"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-cloud-tools-common"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-headers-4.15.0-194"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-headers-4.15.0-194-generic"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-headers-4.15.0-194-generic-lpae"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-headers-4.15.0-194-lowlatency"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-image-4.15.0-194-generic"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-image-4.15.0-194-generic-lpae"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-image-4.15.0-194-lowlatency"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-image-unsigned-4.15.0-194-generic"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-image-unsigned-4.15.0-194-lowlatency"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-libc-dev"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-modules-4.15.0-194-generic"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-modules-4.15.0-194-generic-lpae"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-modules-4.15.0-194-lowlatency"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-modules-extra-4.15.0-194-generic"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-source-4.15.0"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-tools-4.15.0-194"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-tools-4.15.0-194-generic"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-tools-4.15.0-194-generic-lpae"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-tools-4.15.0-194-lowlatency"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-tools-common"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-tools-host"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-udebs-generic"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "linux-udebs-generic-lpae"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "md-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "md-modules-4.15.0-194-generic-lpae-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "message-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "mouse-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "mouse-modules-4.15.0-194-generic-lpae-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "multipath-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "multipath-modules-4.15.0-194-generic-lpae-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "nfs-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "nfs-modules-4.15.0-194-generic-lpae-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "nic-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "nic-modules-4.15.0-194-generic-lpae-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "nic-pcmcia-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "nic-shared-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "nic-shared-modules-4.15.0-194-generic-lpae-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "nic-usb-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "nic-usb-modules-4.15.0-194-generic-lpae-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "parport-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "parport-modules-4.15.0-194-generic-lpae-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "pata-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "pcmcia-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "pcmcia-storage-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "plip-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "plip-modules-4.15.0-194-generic-lpae-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "ppp-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "ppp-modules-4.15.0-194-generic-lpae-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "sata-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "sata-modules-4.15.0-194-generic-lpae-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "scsi-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "scsi-modules-4.15.0-194-generic-lpae-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "serial-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "storage-core-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "storage-core-modules-4.15.0-194-generic-lpae-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "usb-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "usb-modules-4.15.0-194-generic-lpae-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "virtio-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "vlan-modules-4.15.0-194-generic-di"
},
{
"binary_version": "4.15.0-194.205",
"binary_name": "vlan-modules-4.15.0-194-generic-lpae-di"
}
]
}{
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-0812"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-1012"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-2318"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-26365"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-32296"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-33740"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-33741"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-33742"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-33744"
}
],
"ecosystem": "Ubuntu:18.04:LTS"
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "4.15.0-1054.59",
"binary_name": "linux-buildinfo-4.15.0-1054-dell300x"
},
{
"binary_version": "4.15.0-1054.59",
"binary_name": "linux-dell300x-headers-4.15.0-1054"
},
{
"binary_version": "4.15.0-1054.59",
"binary_name": "linux-dell300x-tools-4.15.0-1054"
},
{
"binary_version": "4.15.0-1054.59",
"binary_name": "linux-headers-4.15.0-1054-dell300x"
},
{
"binary_version": "4.15.0-1054.59",
"binary_name": "linux-image-unsigned-4.15.0-1054-dell300x"
},
{
"binary_version": "4.15.0-1054.59",
"binary_name": "linux-modules-4.15.0-1054-dell300x"
},
{
"binary_version": "4.15.0-1054.59",
"binary_name": "linux-tools-4.15.0-1054-dell300x"
}
]
}{
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-0812"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-1012"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-2318"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-26365"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-32296"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-33740"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-33741"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-33742"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-33744"
}
],
"ecosystem": "Ubuntu:18.04:LTS"
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "4.15.0-1128.133",
"binary_name": "linux-buildinfo-4.15.0-1128-kvm"
},
{
"binary_version": "4.15.0-1128.133",
"binary_name": "linux-headers-4.15.0-1128-kvm"
},
{
"binary_version": "4.15.0-1128.133",
"binary_name": "linux-image-4.15.0-1128-kvm"
},
{
"binary_version": "4.15.0-1128.133",
"binary_name": "linux-kvm-headers-4.15.0-1128"
},
{
"binary_version": "4.15.0-1128.133",
"binary_name": "linux-kvm-tools-4.15.0-1128"
},
{
"binary_version": "4.15.0-1128.133",
"binary_name": "linux-modules-4.15.0-1128-kvm"
},
{
"binary_version": "4.15.0-1128.133",
"binary_name": "linux-tools-4.15.0-1128-kvm"
}
]
}{
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-0812"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-1012"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-2318"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-26365"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-32296"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-33740"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-33741"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-33742"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-33744"
}
],
"ecosystem": "Ubuntu:18.04:LTS"
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "4.15.0-1107.118",
"binary_name": "linux-buildinfo-4.15.0-1107-oracle"
},
{
"binary_version": "4.15.0-1107.118",
"binary_name": "linux-headers-4.15.0-1107-oracle"
},
{
"binary_version": "4.15.0-1107.118",
"binary_name": "linux-image-unsigned-4.15.0-1107-oracle"
},
{
"binary_version": "4.15.0-1107.118",
"binary_name": "linux-modules-4.15.0-1107-oracle"
},
{
"binary_version": "4.15.0-1107.118",
"binary_name": "linux-modules-extra-4.15.0-1107-oracle"
},
{
"binary_version": "4.15.0-1107.118",
"binary_name": "linux-oracle-headers-4.15.0-1107"
},
{
"binary_version": "4.15.0-1107.118",
"binary_name": "linux-oracle-tools-4.15.0-1107"
},
{
"binary_version": "4.15.0-1107.118",
"binary_name": "linux-tools-4.15.0-1107-oracle"
}
]
}{
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-0812"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-1012"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-2318"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-26365"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-32296"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-33740"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-33741"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-33742"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-33744"
}
],
"ecosystem": "Ubuntu:18.04:LTS"
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "4.15.0-1120.128",
"binary_name": "linux-buildinfo-4.15.0-1120-raspi2"
},
{
"binary_version": "4.15.0-1120.128",
"binary_name": "linux-headers-4.15.0-1120-raspi2"
},
{
"binary_version": "4.15.0-1120.128",
"binary_name": "linux-image-4.15.0-1120-raspi2"
},
{
"binary_version": "4.15.0-1120.128",
"binary_name": "linux-modules-4.15.0-1120-raspi2"
},
{
"binary_version": "4.15.0-1120.128",
"binary_name": "linux-raspi2-headers-4.15.0-1120"
},
{
"binary_version": "4.15.0-1120.128",
"binary_name": "linux-raspi2-tools-4.15.0-1120"
},
{
"binary_version": "4.15.0-1120.128",
"binary_name": "linux-tools-4.15.0-1120-raspi2"
}
]
}{
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-0812"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-1012"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-2318"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-26365"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-32296"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-33740"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-33741"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-33742"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-33744"
}
],
"ecosystem": "Ubuntu:18.04:LTS"
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "4.15.0-1138.148",
"binary_name": "linux-buildinfo-4.15.0-1138-snapdragon"
},
{
"binary_version": "4.15.0-1138.148",
"binary_name": "linux-headers-4.15.0-1138-snapdragon"
},
{
"binary_version": "4.15.0-1138.148",
"binary_name": "linux-image-4.15.0-1138-snapdragon"
},
{
"binary_version": "4.15.0-1138.148",
"binary_name": "linux-modules-4.15.0-1138-snapdragon"
},
{
"binary_version": "4.15.0-1138.148",
"binary_name": "linux-snapdragon-headers-4.15.0-1138"
},
{
"binary_version": "4.15.0-1138.148",
"binary_name": "linux-snapdragon-tools-4.15.0-1138"
},
{
"binary_version": "4.15.0-1138.148",
"binary_name": "linux-tools-4.15.0-1138-snapdragon"
}
]
}{
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-0812"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-1012"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-2318"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-26365"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-32296"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-33740"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-33741"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-33742"
},
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
],
"id": "CVE-2022-33744"
}
],
"ecosystem": "Ubuntu:18.04:LTS"
}