It was discovered that an out-of-bounds write vulnerability existed in the Video for Linux 2 (V4L2) implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-20369)
Pawan Kumar Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir Shildan and Ariel Sabba discovered that some Intel processors with Enhanced Indirect Branch Restricted Speculation (eIBRS) did not properly handle RET instructions after a VM exits. A local attacker could potentially use this to expose sensitive information. (CVE-2022-26373)
David Leadbeater discovered that the netfilter IRC protocol tracking implementation in the Linux Kernel incorrectly handled certain message payloads in some situations. A remote attacker could possibly use this to cause a denial of service or bypass firewall filtering. (CVE-2022-2663)
Johannes Wikner and Kaveh Razavi discovered that for some AMD x86-64 processors, the branch predictor could by mis-trained for return instructions in certain circumstances. A local attacker could possibly use this to expose sensitive information. (CVE-2022-29900)
Johannes Wikner and Kaveh Razavi discovered that for some Intel x86-64 processors, the Linux kernel's protections against speculative branch target injection attacks were insufficient in some circumstances. A local attacker could possibly use this to expose sensitive information. (CVE-2022-29901)
It was discovered that the NILFS2 file system implementation in the Linux kernel did not properly deallocate memory in certain error conditions. An attacker could use this to cause a denial of service (memory exhaustion). (CVE-2022-3646)
Khalid Masum discovered that the NILFS2 file system implementation in the Linux kernel did not properly handle certain error conditions, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2022-3649)
Hyunwoo Kim discovered that an integer overflow vulnerability existed in the PXA3xx graphics driver in the Linux kernel. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-39842)
It was discovered that a race condition existed in the SMSC UFX USB driver implementation in the Linux kernel, leading to a use-after-free vulnerability. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-41849)
It was discovered that a race condition existed in the Roccat HID driver in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-41850)
It was discovered that the USB monitoring (usbmon) component in the Linux kernel did not properly set permissions on memory mapped in to user space processes. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-43750)
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "block-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "block-modules-4.15.0-204-generic-lpae-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "crypto-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "crypto-modules-4.15.0-204-generic-lpae-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "dasd-extra-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "dasd-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "fat-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "fat-modules-4.15.0-204-generic-lpae-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "fb-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "firewire-core-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "floppy-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "fs-core-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "fs-core-modules-4.15.0-204-generic-lpae-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "fs-secondary-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "fs-secondary-modules-4.15.0-204-generic-lpae-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "input-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "input-modules-4.15.0-204-generic-lpae-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "ipmi-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "ipmi-modules-4.15.0-204-generic-lpae-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "irda-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "irda-modules-4.15.0-204-generic-lpae-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "kernel-image-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "kernel-image-4.15.0-204-generic-lpae-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-buildinfo-4.15.0-204-generic",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-buildinfo-4.15.0-204-generic-lpae",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-buildinfo-4.15.0-204-lowlatency",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-cloud-tools-4.15.0-204",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-cloud-tools-4.15.0-204-generic",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-cloud-tools-4.15.0-204-lowlatency",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-cloud-tools-common",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-headers-4.15.0-204",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-headers-4.15.0-204-generic",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-headers-4.15.0-204-generic-lpae",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-headers-4.15.0-204-lowlatency",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-image-4.15.0-204-generic",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-image-4.15.0-204-generic-lpae",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-image-4.15.0-204-lowlatency",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-image-unsigned-4.15.0-204-generic",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-image-unsigned-4.15.0-204-lowlatency",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-libc-dev",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-modules-4.15.0-204-generic",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-modules-4.15.0-204-generic-lpae",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-modules-4.15.0-204-lowlatency",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-modules-extra-4.15.0-204-generic",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-source-4.15.0",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-tools-4.15.0-204",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-tools-4.15.0-204-generic",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-tools-4.15.0-204-generic-lpae",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-tools-4.15.0-204-lowlatency",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-tools-common",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-tools-host",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-udebs-generic",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "linux-udebs-generic-lpae",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "md-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "md-modules-4.15.0-204-generic-lpae-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "message-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "mouse-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "mouse-modules-4.15.0-204-generic-lpae-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "multipath-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "multipath-modules-4.15.0-204-generic-lpae-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "nfs-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "nfs-modules-4.15.0-204-generic-lpae-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "nic-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "nic-modules-4.15.0-204-generic-lpae-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "nic-pcmcia-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "nic-shared-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "nic-shared-modules-4.15.0-204-generic-lpae-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "nic-usb-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "nic-usb-modules-4.15.0-204-generic-lpae-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "parport-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "parport-modules-4.15.0-204-generic-lpae-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "pata-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "pcmcia-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "pcmcia-storage-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "plip-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "plip-modules-4.15.0-204-generic-lpae-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "ppp-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "ppp-modules-4.15.0-204-generic-lpae-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "sata-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "sata-modules-4.15.0-204-generic-lpae-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "scsi-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "scsi-modules-4.15.0-204-generic-lpae-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "serial-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "storage-core-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "storage-core-modules-4.15.0-204-generic-lpae-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "usb-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "usb-modules-4.15.0-204-generic-lpae-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "virtio-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "vlan-modules-4.15.0-204-generic-di",
"binary_version": "4.15.0-204.215"
},
{
"binary_name": "vlan-modules-4.15.0-204-generic-lpae-di",
"binary_version": "4.15.0-204.215"
}
]
}{
"cves": [
{
"id": "CVE-2022-2663",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3646",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3649",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-20369",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-26373",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-29900",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-29901",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-39842",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2022-41849",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2022-41850",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2022-43750",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
],
"ecosystem": "Ubuntu:18.04:LTS"
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-aws-cloud-tools-4.15.0-1150",
"binary_version": "4.15.0-1150.163"
},
{
"binary_name": "linux-aws-headers-4.15.0-1150",
"binary_version": "4.15.0-1150.163"
},
{
"binary_name": "linux-aws-tools-4.15.0-1150",
"binary_version": "4.15.0-1150.163"
},
{
"binary_name": "linux-buildinfo-4.15.0-1150-aws",
"binary_version": "4.15.0-1150.163"
},
{
"binary_name": "linux-cloud-tools-4.15.0-1150-aws",
"binary_version": "4.15.0-1150.163"
},
{
"binary_name": "linux-headers-4.15.0-1150-aws",
"binary_version": "4.15.0-1150.163"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1150-aws",
"binary_version": "4.15.0-1150.163"
},
{
"binary_name": "linux-modules-4.15.0-1150-aws",
"binary_version": "4.15.0-1150.163"
},
{
"binary_name": "linux-modules-extra-4.15.0-1150-aws",
"binary_version": "4.15.0-1150.163"
},
{
"binary_name": "linux-tools-4.15.0-1150-aws",
"binary_version": "4.15.0-1150.163"
}
]
}{
"cves": [
{
"id": "CVE-2022-2663",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3646",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3649",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-20369",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-26373",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-29900",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-29901",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-39842",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2022-41849",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2022-41850",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2022-43750",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
],
"ecosystem": "Ubuntu:18.04:LTS"
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1145-gcp",
"binary_version": "4.15.0-1145.161"
},
{
"binary_name": "linux-gcp-4.15-headers-4.15.0-1145",
"binary_version": "4.15.0-1145.161"
},
{
"binary_name": "linux-gcp-4.15-tools-4.15.0-1145",
"binary_version": "4.15.0-1145.161"
},
{
"binary_name": "linux-headers-4.15.0-1145-gcp",
"binary_version": "4.15.0-1145.161"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1145-gcp",
"binary_version": "4.15.0-1145.161"
},
{
"binary_name": "linux-modules-4.15.0-1145-gcp",
"binary_version": "4.15.0-1145.161"
},
{
"binary_name": "linux-modules-extra-4.15.0-1145-gcp",
"binary_version": "4.15.0-1145.161"
},
{
"binary_name": "linux-tools-4.15.0-1145-gcp",
"binary_version": "4.15.0-1145.161"
}
]
}{
"cves": [
{
"id": "CVE-2022-2663",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3646",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3649",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-20369",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-26373",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-29900",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-29901",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-39842",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2022-41849",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2022-41850",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2022-43750",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
],
"ecosystem": "Ubuntu:18.04:LTS"
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1135-kvm",
"binary_version": "4.15.0-1135.140"
},
{
"binary_name": "linux-headers-4.15.0-1135-kvm",
"binary_version": "4.15.0-1135.140"
},
{
"binary_name": "linux-image-4.15.0-1135-kvm",
"binary_version": "4.15.0-1135.140"
},
{
"binary_name": "linux-kvm-headers-4.15.0-1135",
"binary_version": "4.15.0-1135.140"
},
{
"binary_name": "linux-kvm-tools-4.15.0-1135",
"binary_version": "4.15.0-1135.140"
},
{
"binary_name": "linux-modules-4.15.0-1135-kvm",
"binary_version": "4.15.0-1135.140"
},
{
"binary_name": "linux-tools-4.15.0-1135-kvm",
"binary_version": "4.15.0-1135.140"
}
]
}{
"cves": [
{
"id": "CVE-2022-2663",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3646",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3649",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-20369",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-26373",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-29900",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-29901",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-39842",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2022-41849",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2022-41850",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2022-43750",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
],
"ecosystem": "Ubuntu:18.04:LTS"
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1114-oracle",
"binary_version": "4.15.0-1114.125"
},
{
"binary_name": "linux-headers-4.15.0-1114-oracle",
"binary_version": "4.15.0-1114.125"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1114-oracle",
"binary_version": "4.15.0-1114.125"
},
{
"binary_name": "linux-modules-4.15.0-1114-oracle",
"binary_version": "4.15.0-1114.125"
},
{
"binary_name": "linux-modules-extra-4.15.0-1114-oracle",
"binary_version": "4.15.0-1114.125"
},
{
"binary_name": "linux-oracle-headers-4.15.0-1114",
"binary_version": "4.15.0-1114.125"
},
{
"binary_name": "linux-oracle-tools-4.15.0-1114",
"binary_version": "4.15.0-1114.125"
},
{
"binary_name": "linux-tools-4.15.0-1114-oracle",
"binary_version": "4.15.0-1114.125"
}
]
}{
"cves": [
{
"id": "CVE-2022-2663",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3646",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3649",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-20369",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-26373",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-29900",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-29901",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-39842",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2022-41849",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2022-41850",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2022-43750",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
],
"ecosystem": "Ubuntu:18.04:LTS"
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1127-raspi2",
"binary_version": "4.15.0-1127.135"
},
{
"binary_name": "linux-headers-4.15.0-1127-raspi2",
"binary_version": "4.15.0-1127.135"
},
{
"binary_name": "linux-image-4.15.0-1127-raspi2",
"binary_version": "4.15.0-1127.135"
},
{
"binary_name": "linux-modules-4.15.0-1127-raspi2",
"binary_version": "4.15.0-1127.135"
},
{
"binary_name": "linux-raspi2-headers-4.15.0-1127",
"binary_version": "4.15.0-1127.135"
},
{
"binary_name": "linux-raspi2-tools-4.15.0-1127",
"binary_version": "4.15.0-1127.135"
},
{
"binary_name": "linux-tools-4.15.0-1127-raspi2",
"binary_version": "4.15.0-1127.135"
}
]
}{
"cves": [
{
"id": "CVE-2022-2663",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3646",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3649",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-20369",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-26373",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-29900",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-29901",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-39842",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2022-41849",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2022-41850",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2022-43750",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
],
"ecosystem": "Ubuntu:18.04:LTS"
}