It was discovered that the Upper Level Protocol (ULP) subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-0461)
Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-4378)
It was discovered that a race condition existed in the Kernel Connection Multiplexor (KCM) socket implementation in the Linux kernel when releasing sockets in certain situations. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-3521)
It was discovered that the Netronome Ethernet driver in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-3545)
It was discovered that the Broadcom FullMAC USB WiFi driver in the Linux kernel did not properly perform bounds checking in some situations. A physically proximate attacker could use this to craft a malicious USB device that when inserted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-3628)
It was discovered that a use-after-free vulnerability existed in the Bluetooth stack in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-3640)
It was discovered that a race condition existed in the Xen network backend driver in the Linux kernel when handling dropped packets in certain circumstances. An attacker could use this to cause a denial of service (kernel deadlock). (CVE-2022-42328, CVE-2022-42329)
Tamás Koczka discovered that the Bluetooth L2CAP implementation in the Linux kernel did not properly initialize memory in some situations. A physically proximate attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2022-42895)
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "block-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "block-modules-4.15.0-206-generic-lpae-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "crypto-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "crypto-modules-4.15.0-206-generic-lpae-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "dasd-extra-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "dasd-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "fat-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "fat-modules-4.15.0-206-generic-lpae-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "fb-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "firewire-core-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "floppy-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "fs-core-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "fs-core-modules-4.15.0-206-generic-lpae-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "fs-secondary-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "fs-secondary-modules-4.15.0-206-generic-lpae-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "input-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "input-modules-4.15.0-206-generic-lpae-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "ipmi-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "ipmi-modules-4.15.0-206-generic-lpae-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "irda-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "irda-modules-4.15.0-206-generic-lpae-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "kernel-image-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "kernel-image-4.15.0-206-generic-lpae-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-buildinfo-4.15.0-206-generic",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-buildinfo-4.15.0-206-generic-lpae",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-buildinfo-4.15.0-206-lowlatency",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-cloud-tools-4.15.0-206",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-cloud-tools-4.15.0-206-generic",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-cloud-tools-4.15.0-206-lowlatency",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-cloud-tools-common",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-headers-4.15.0-206",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-headers-4.15.0-206-generic",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-headers-4.15.0-206-generic-lpae",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-headers-4.15.0-206-lowlatency",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-image-4.15.0-206-generic",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-image-4.15.0-206-generic-lpae",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-image-4.15.0-206-lowlatency",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-image-unsigned-4.15.0-206-generic",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-image-unsigned-4.15.0-206-lowlatency",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-libc-dev",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-modules-4.15.0-206-generic",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-modules-4.15.0-206-generic-lpae",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-modules-4.15.0-206-lowlatency",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-modules-extra-4.15.0-206-generic",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-source-4.15.0",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-tools-4.15.0-206",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-tools-4.15.0-206-generic",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-tools-4.15.0-206-generic-lpae",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-tools-4.15.0-206-lowlatency",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-tools-common",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-tools-host",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-udebs-generic",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "linux-udebs-generic-lpae",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "md-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "md-modules-4.15.0-206-generic-lpae-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "message-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "mouse-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "mouse-modules-4.15.0-206-generic-lpae-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "multipath-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "multipath-modules-4.15.0-206-generic-lpae-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "nfs-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "nfs-modules-4.15.0-206-generic-lpae-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "nic-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "nic-modules-4.15.0-206-generic-lpae-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "nic-pcmcia-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "nic-shared-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "nic-shared-modules-4.15.0-206-generic-lpae-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "nic-usb-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "nic-usb-modules-4.15.0-206-generic-lpae-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "parport-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "parport-modules-4.15.0-206-generic-lpae-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "pata-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "pcmcia-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "pcmcia-storage-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "plip-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "plip-modules-4.15.0-206-generic-lpae-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "ppp-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "ppp-modules-4.15.0-206-generic-lpae-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "sata-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "sata-modules-4.15.0-206-generic-lpae-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "scsi-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "scsi-modules-4.15.0-206-generic-lpae-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "serial-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "storage-core-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "storage-core-modules-4.15.0-206-generic-lpae-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "usb-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "usb-modules-4.15.0-206-generic-lpae-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "virtio-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "vlan-modules-4.15.0-206-generic-di",
"binary_version": "4.15.0-206.217"
},
{
"binary_name": "vlan-modules-4.15.0-206-generic-lpae-di",
"binary_version": "4.15.0-206.217"
}
]
}
{
"ecosystem": "Ubuntu:18.04:LTS",
"cves": [
{
"id": "CVE-2022-3521",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3545",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3628",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3640",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-42328",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-42329",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-42895",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2023-0461",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "high"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-aws-cloud-tools-4.15.0-1151",
"binary_version": "4.15.0-1151.164"
},
{
"binary_name": "linux-aws-headers-4.15.0-1151",
"binary_version": "4.15.0-1151.164"
},
{
"binary_name": "linux-aws-tools-4.15.0-1151",
"binary_version": "4.15.0-1151.164"
},
{
"binary_name": "linux-buildinfo-4.15.0-1151-aws",
"binary_version": "4.15.0-1151.164"
},
{
"binary_name": "linux-cloud-tools-4.15.0-1151-aws",
"binary_version": "4.15.0-1151.164"
},
{
"binary_name": "linux-headers-4.15.0-1151-aws",
"binary_version": "4.15.0-1151.164"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1151-aws",
"binary_version": "4.15.0-1151.164"
},
{
"binary_name": "linux-modules-4.15.0-1151-aws",
"binary_version": "4.15.0-1151.164"
},
{
"binary_name": "linux-modules-extra-4.15.0-1151-aws",
"binary_version": "4.15.0-1151.164"
},
{
"binary_name": "linux-tools-4.15.0-1151-aws",
"binary_version": "4.15.0-1151.164"
}
]
}
{
"ecosystem": "Ubuntu:18.04:LTS",
"cves": [
{
"id": "CVE-2022-3521",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3545",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3628",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3640",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-42328",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-42329",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-42895",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2023-0461",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "high"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1061-dell300x",
"binary_version": "4.15.0-1061.66"
},
{
"binary_name": "linux-dell300x-headers-4.15.0-1061",
"binary_version": "4.15.0-1061.66"
},
{
"binary_name": "linux-dell300x-tools-4.15.0-1061",
"binary_version": "4.15.0-1061.66"
},
{
"binary_name": "linux-headers-4.15.0-1061-dell300x",
"binary_version": "4.15.0-1061.66"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1061-dell300x",
"binary_version": "4.15.0-1061.66"
},
{
"binary_name": "linux-modules-4.15.0-1061-dell300x",
"binary_version": "4.15.0-1061.66"
},
{
"binary_name": "linux-tools-4.15.0-1061-dell300x",
"binary_version": "4.15.0-1061.66"
}
]
}
{
"ecosystem": "Ubuntu:18.04:LTS",
"cves": [
{
"id": "CVE-2022-3521",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3545",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3628",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3640",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-42328",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-42329",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-42895",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2023-0461",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "high"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1146-gcp",
"binary_version": "4.15.0-1146.162"
},
{
"binary_name": "linux-gcp-4.15-headers-4.15.0-1146",
"binary_version": "4.15.0-1146.162"
},
{
"binary_name": "linux-gcp-4.15-tools-4.15.0-1146",
"binary_version": "4.15.0-1146.162"
},
{
"binary_name": "linux-headers-4.15.0-1146-gcp",
"binary_version": "4.15.0-1146.162"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1146-gcp",
"binary_version": "4.15.0-1146.162"
},
{
"binary_name": "linux-modules-4.15.0-1146-gcp",
"binary_version": "4.15.0-1146.162"
},
{
"binary_name": "linux-modules-extra-4.15.0-1146-gcp",
"binary_version": "4.15.0-1146.162"
},
{
"binary_name": "linux-tools-4.15.0-1146-gcp",
"binary_version": "4.15.0-1146.162"
}
]
}
{
"ecosystem": "Ubuntu:18.04:LTS",
"cves": [
{
"id": "CVE-2022-3521",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3545",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3628",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3640",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-42328",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-42329",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-42895",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2023-0461",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "high"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1115-oracle",
"binary_version": "4.15.0-1115.126"
},
{
"binary_name": "linux-headers-4.15.0-1115-oracle",
"binary_version": "4.15.0-1115.126"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1115-oracle",
"binary_version": "4.15.0-1115.126"
},
{
"binary_name": "linux-modules-4.15.0-1115-oracle",
"binary_version": "4.15.0-1115.126"
},
{
"binary_name": "linux-modules-extra-4.15.0-1115-oracle",
"binary_version": "4.15.0-1115.126"
},
{
"binary_name": "linux-oracle-headers-4.15.0-1115",
"binary_version": "4.15.0-1115.126"
},
{
"binary_name": "linux-oracle-tools-4.15.0-1115",
"binary_version": "4.15.0-1115.126"
},
{
"binary_name": "linux-tools-4.15.0-1115-oracle",
"binary_version": "4.15.0-1115.126"
}
]
}
{
"ecosystem": "Ubuntu:18.04:LTS",
"cves": [
{
"id": "CVE-2022-3521",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3545",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3628",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-3640",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-42328",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-42329",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2022-42895",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2023-0461",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "high"
}
]
}
]
}