It was discovered that the network traffic control implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-1055)
It was discovered that the IPsec implementation in the Linux kernel did not properly allocate enough memory when performing ESP transformations, leading to a heap-based buffer overflow. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-27666)
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-aws-5.4-cloud-tools-5.4.0-1071",
"binary_version": "5.4.0-1071.76~18.04.1"
},
{
"binary_name": "linux-aws-5.4-headers-5.4.0-1071",
"binary_version": "5.4.0-1071.76~18.04.1"
},
{
"binary_name": "linux-aws-5.4-tools-5.4.0-1071",
"binary_version": "5.4.0-1071.76~18.04.1"
},
{
"binary_name": "linux-buildinfo-5.4.0-1071-aws",
"binary_version": "5.4.0-1071.76~18.04.1"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1071-aws",
"binary_version": "5.4.0-1071.76~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1071-aws",
"binary_version": "5.4.0-1071.76~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1071-aws",
"binary_version": "5.4.0-1071.76~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1071-aws",
"binary_version": "5.4.0-1071.76~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1071-aws",
"binary_version": "5.4.0-1071.76~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1071-aws",
"binary_version": "5.4.0-1071.76~18.04.1"
}
]
}{
"ecosystem": "Ubuntu:18.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-azure-5.4-cloud-tools-5.4.0-1074",
"binary_version": "5.4.0-1074.77~18.04.1"
},
{
"binary_name": "linux-azure-5.4-headers-5.4.0-1074",
"binary_version": "5.4.0-1074.77~18.04.1"
},
{
"binary_name": "linux-azure-5.4-tools-5.4.0-1074",
"binary_version": "5.4.0-1074.77~18.04.1"
},
{
"binary_name": "linux-buildinfo-5.4.0-1074-azure",
"binary_version": "5.4.0-1074.77~18.04.1"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1074-azure",
"binary_version": "5.4.0-1074.77~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1074-azure",
"binary_version": "5.4.0-1074.77~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1074-azure",
"binary_version": "5.4.0-1074.77~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1074-azure",
"binary_version": "5.4.0-1074.77~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1074-azure",
"binary_version": "5.4.0-1074.77~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1074-azure",
"binary_version": "5.4.0-1074.77~18.04.1"
}
]
}{
"ecosystem": "Ubuntu:18.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1069-gcp",
"binary_version": "5.4.0-1069.73~18.04.1"
},
{
"binary_name": "linux-gcp-5.4-headers-5.4.0-1069",
"binary_version": "5.4.0-1069.73~18.04.1"
},
{
"binary_name": "linux-gcp-5.4-tools-5.4.0-1069",
"binary_version": "5.4.0-1069.73~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1069-gcp",
"binary_version": "5.4.0-1069.73~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1069-gcp",
"binary_version": "5.4.0-1069.73~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1069-gcp",
"binary_version": "5.4.0-1069.73~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1069-gcp",
"binary_version": "5.4.0-1069.73~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1069-gcp",
"binary_version": "5.4.0-1069.73~18.04.1"
}
]
}{
"ecosystem": "Ubuntu:18.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1067-gke",
"binary_version": "5.4.0-1067.70~18.04.1"
},
{
"binary_name": "linux-gke-5.4-headers-5.4.0-1067",
"binary_version": "5.4.0-1067.70~18.04.1"
},
{
"binary_name": "linux-gke-5.4-tools-5.4.0-1067",
"binary_version": "5.4.0-1067.70~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1067-gke",
"binary_version": "5.4.0-1067.70~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1067-gke",
"binary_version": "5.4.0-1067.70~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1067-gke",
"binary_version": "5.4.0-1067.70~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1067-gke",
"binary_version": "5.4.0-1067.70~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1067-gke",
"binary_version": "5.4.0-1067.70~18.04.1"
}
]
}{
"ecosystem": "Ubuntu:18.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1038-gkeop",
"binary_version": "5.4.0-1038.39~18.04.1"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1038-gkeop",
"binary_version": "5.4.0-1038.39~18.04.1"
},
{
"binary_name": "linux-gkeop-5.4-cloud-tools-5.4.0-1038",
"binary_version": "5.4.0-1038.39~18.04.1"
},
{
"binary_name": "linux-gkeop-5.4-headers-5.4.0-1038",
"binary_version": "5.4.0-1038.39~18.04.1"
},
{
"binary_name": "linux-gkeop-5.4-source-5.4.0",
"binary_version": "5.4.0-1038.39~18.04.1"
},
{
"binary_name": "linux-gkeop-5.4-tools-5.4.0-1038",
"binary_version": "5.4.0-1038.39~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1038-gkeop",
"binary_version": "5.4.0-1038.39~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1038-gkeop",
"binary_version": "5.4.0-1038.39~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1038-gkeop",
"binary_version": "5.4.0-1038.39~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1038-gkeop",
"binary_version": "5.4.0-1038.39~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1038-gkeop",
"binary_version": "5.4.0-1038.39~18.04.1"
}
]
}{
"ecosystem": "Ubuntu:18.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1019-ibm",
"binary_version": "5.4.0-1019.21~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1019-ibm",
"binary_version": "5.4.0-1019.21~18.04.1"
},
{
"binary_name": "linux-ibm-5.4-cloud-tools-common",
"binary_version": "5.4.0-1019.21~18.04.1"
},
{
"binary_name": "linux-ibm-5.4-headers-5.4.0-1019",
"binary_version": "5.4.0-1019.21~18.04.1"
},
{
"binary_name": "linux-ibm-5.4-source-5.4.0",
"binary_version": "5.4.0-1019.21~18.04.1"
},
{
"binary_name": "linux-ibm-5.4-tools-5.4.0-1019",
"binary_version": "5.4.0-1019.21~18.04.1"
},
{
"binary_name": "linux-ibm-5.4-tools-common",
"binary_version": "5.4.0-1019.21~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1019-ibm",
"binary_version": "5.4.0-1019.21~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1019-ibm",
"binary_version": "5.4.0-1019.21~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1019-ibm",
"binary_version": "5.4.0-1019.21~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1019-ibm",
"binary_version": "5.4.0-1019.21~18.04.1"
}
]
}{
"ecosystem": "Ubuntu:18.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1058-raspi",
"binary_version": "5.4.0-1058.65~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1058-raspi",
"binary_version": "5.4.0-1058.65~18.04.1"
},
{
"binary_name": "linux-image-5.4.0-1058-raspi",
"binary_version": "5.4.0-1058.65~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1058-raspi",
"binary_version": "5.4.0-1058.65~18.04.1"
},
{
"binary_name": "linux-raspi-5.4-headers-5.4.0-1058",
"binary_version": "5.4.0-1058.65~18.04.1"
},
{
"binary_name": "linux-raspi-5.4-tools-5.4.0-1058",
"binary_version": "5.4.0-1058.65~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1058-raspi",
"binary_version": "5.4.0-1058.65~18.04.1"
}
]
}{
"ecosystem": "Ubuntu:18.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-aws-5.13-cloud-tools-5.13.0-1021",
"binary_version": "5.13.0-1021.23~20.04.2"
},
{
"binary_name": "linux-aws-5.13-headers-5.13.0-1021",
"binary_version": "5.13.0-1021.23~20.04.2"
},
{
"binary_name": "linux-aws-5.13-tools-5.13.0-1021",
"binary_version": "5.13.0-1021.23~20.04.2"
},
{
"binary_name": "linux-buildinfo-5.13.0-1021-aws",
"binary_version": "5.13.0-1021.23~20.04.2"
},
{
"binary_name": "linux-cloud-tools-5.13.0-1021-aws",
"binary_version": "5.13.0-1021.23~20.04.2"
},
{
"binary_name": "linux-headers-5.13.0-1021-aws",
"binary_version": "5.13.0-1021.23~20.04.2"
},
{
"binary_name": "linux-image-unsigned-5.13.0-1021-aws",
"binary_version": "5.13.0-1021.23~20.04.2"
},
{
"binary_name": "linux-modules-5.13.0-1021-aws",
"binary_version": "5.13.0-1021.23~20.04.2"
},
{
"binary_name": "linux-modules-extra-5.13.0-1021-aws",
"binary_version": "5.13.0-1021.23~20.04.2"
},
{
"binary_name": "linux-tools-5.13.0-1021-aws",
"binary_version": "5.13.0-1021.23~20.04.2"
}
]
}{
"ecosystem": "Ubuntu:20.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-image-unsigned-5.4.0-1074-azure-fde",
"binary_version": "5.4.0-1074.77+cvm1.1"
}
]
}{
"ecosystem": "Ubuntu:20.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1069-gcp",
"binary_version": "5.4.0-1069.73"
},
{
"binary_name": "linux-gcp-headers-5.4.0-1069",
"binary_version": "5.4.0-1069.73"
},
{
"binary_name": "linux-gcp-tools-5.4.0-1069",
"binary_version": "5.4.0-1069.73"
},
{
"binary_name": "linux-headers-5.4.0-1069-gcp",
"binary_version": "5.4.0-1069.73"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1069-gcp",
"binary_version": "5.4.0-1069.73"
},
{
"binary_name": "linux-modules-5.4.0-1069-gcp",
"binary_version": "5.4.0-1069.73"
},
{
"binary_name": "linux-modules-extra-5.4.0-1069-gcp",
"binary_version": "5.4.0-1069.73"
},
{
"binary_name": "linux-tools-5.4.0-1069-gcp",
"binary_version": "5.4.0-1069.73"
}
]
}{
"ecosystem": "Ubuntu:20.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.13.0-1023-gcp",
"binary_version": "5.13.0-1023.28~20.04.1"
},
{
"binary_name": "linux-gcp-5.13-headers-5.13.0-1023",
"binary_version": "5.13.0-1023.28~20.04.1"
},
{
"binary_name": "linux-gcp-5.13-tools-5.13.0-1023",
"binary_version": "5.13.0-1023.28~20.04.1"
},
{
"binary_name": "linux-headers-5.13.0-1023-gcp",
"binary_version": "5.13.0-1023.28~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.13.0-1023-gcp",
"binary_version": "5.13.0-1023.28~20.04.1"
},
{
"binary_name": "linux-modules-5.13.0-1023-gcp",
"binary_version": "5.13.0-1023.28~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.13.0-1023-gcp",
"binary_version": "5.13.0-1023.28~20.04.1"
},
{
"binary_name": "linux-tools-5.13.0-1023-gcp",
"binary_version": "5.13.0-1023.28~20.04.1"
}
]
}{
"ecosystem": "Ubuntu:20.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1067-gke",
"binary_version": "5.4.0-1067.70"
},
{
"binary_name": "linux-gke-headers-5.4.0-1067",
"binary_version": "5.4.0-1067.70"
},
{
"binary_name": "linux-gke-tools-5.4.0-1067",
"binary_version": "5.4.0-1067.70"
},
{
"binary_name": "linux-headers-5.4.0-1067-gke",
"binary_version": "5.4.0-1067.70"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1067-gke",
"binary_version": "5.4.0-1067.70"
},
{
"binary_name": "linux-modules-5.4.0-1067-gke",
"binary_version": "5.4.0-1067.70"
},
{
"binary_name": "linux-modules-extra-5.4.0-1067-gke",
"binary_version": "5.4.0-1067.70"
},
{
"binary_name": "linux-tools-5.4.0-1067-gke",
"binary_version": "5.4.0-1067.70"
}
]
}{
"ecosystem": "Ubuntu:20.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1038-gkeop",
"binary_version": "5.4.0-1038.39"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1038-gkeop",
"binary_version": "5.4.0-1038.39"
},
{
"binary_name": "linux-gkeop-cloud-tools-5.4.0-1038",
"binary_version": "5.4.0-1038.39"
},
{
"binary_name": "linux-gkeop-headers-5.4.0-1038",
"binary_version": "5.4.0-1038.39"
},
{
"binary_name": "linux-gkeop-source-5.4.0",
"binary_version": "5.4.0-1038.39"
},
{
"binary_name": "linux-gkeop-tools-5.4.0-1038",
"binary_version": "5.4.0-1038.39"
},
{
"binary_name": "linux-headers-5.4.0-1038-gkeop",
"binary_version": "5.4.0-1038.39"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1038-gkeop",
"binary_version": "5.4.0-1038.39"
},
{
"binary_name": "linux-modules-5.4.0-1038-gkeop",
"binary_version": "5.4.0-1038.39"
},
{
"binary_name": "linux-modules-extra-5.4.0-1038-gkeop",
"binary_version": "5.4.0-1038.39"
},
{
"binary_name": "linux-tools-5.4.0-1038-gkeop",
"binary_version": "5.4.0-1038.39"
}
]
}{
"ecosystem": "Ubuntu:20.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1019-ibm",
"binary_version": "5.4.0-1019.21"
},
{
"binary_name": "linux-headers-5.4.0-1019-ibm",
"binary_version": "5.4.0-1019.21"
},
{
"binary_name": "linux-ibm-cloud-tools-common",
"binary_version": "5.4.0-1019.21"
},
{
"binary_name": "linux-ibm-headers-5.4.0-1019",
"binary_version": "5.4.0-1019.21"
},
{
"binary_name": "linux-ibm-source-5.4.0",
"binary_version": "5.4.0-1019.21"
},
{
"binary_name": "linux-ibm-tools-5.4.0-1019",
"binary_version": "5.4.0-1019.21"
},
{
"binary_name": "linux-ibm-tools-common",
"binary_version": "5.4.0-1019.21"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1019-ibm",
"binary_version": "5.4.0-1019.21"
},
{
"binary_name": "linux-modules-5.4.0-1019-ibm",
"binary_version": "5.4.0-1019.21"
},
{
"binary_name": "linux-modules-extra-5.4.0-1019-ibm",
"binary_version": "5.4.0-1019.21"
},
{
"binary_name": "linux-tools-5.4.0-1019-ibm",
"binary_version": "5.4.0-1019.21"
}
]
}{
"ecosystem": "Ubuntu:20.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1058-raspi",
"binary_version": "5.4.0-1058.65"
},
{
"binary_name": "linux-headers-5.4.0-1058-raspi",
"binary_version": "5.4.0-1058.65"
},
{
"binary_name": "linux-image-5.4.0-1058-raspi",
"binary_version": "5.4.0-1058.65"
},
{
"binary_name": "linux-modules-5.4.0-1058-raspi",
"binary_version": "5.4.0-1058.65"
},
{
"binary_name": "linux-raspi-headers-5.4.0-1058",
"binary_version": "5.4.0-1058.65"
},
{
"binary_name": "linux-raspi-tools-5.4.0-1058",
"binary_version": "5.4.0-1058.65"
},
{
"binary_name": "linux-tools-5.4.0-1058-raspi",
"binary_version": "5.4.0-1058.65"
}
]
}{
"ecosystem": "Ubuntu:20.04:LTS",
"cves": [
{
"id": "CVE-2022-1055",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V4",
"score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N"
},
{
"type": "Ubuntu",
"score": "high"
}
]
},
{
"id": "CVE-2022-27666",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}