{"id":"USN-5669-2","summary":"linux-hwe, linux-oracle vulnerabilities","details":"It was discovered that the SUNRPC RDMA protocol implementation in the Linux\nkernel did not properly calculate the header size of a RPC message payload.\nA local attacker could use this to expose sensitive information (kernel\nmemory). (CVE-2022-0812)\n\nMoshe Kol, Amit Klein and Yossi Gilad discovered that the IP implementation\nin the Linux kernel did not provide sufficient randomization when\ncalculating port offsets. An attacker could possibly use this to expose\nsensitive information. (CVE-2022-1012, CVE-2022-32296)\n\nDuoming Zhou discovered that race conditions existed in the timer handling\nimplementation of the Linux kernel's Rose X.25 protocol layer, resulting in\nuse-after-free vulnerabilities. A local attacker could use this to cause a\ndenial of service (system crash). (CVE-2022-2318)\n\nRoger Pau Monné discovered that the Xen virtual block driver in the Linux\nkernel did not properly initialize memory pages to be used for shared\ncommunication with the backend. A local attacker could use this to expose\nsensitive information (guest kernel memory). (CVE-2022-26365)\n\nRoger Pau Monné discovered that the Xen paravirtualization frontend in the\nLinux kernel did not properly initialize memory pages to be used for shared\ncommunication with the backend. A local attacker could use this to expose\nsensitive information (guest kernel memory). (CVE-2022-33740)\n\nIt was discovered that the Xen paravirtualization frontend in the Linux\nkernel incorrectly shared unrelated data when communicating with certain\nbackends. A local attacker could use this to cause a denial of service\n(guest crash) or expose sensitive information (guest kernel memory).\n(CVE-2022-33741, CVE-2022-33742)\n\nOleksandr Tyshchenko discovered that the Xen paravirtualization platform in\nthe Linux kernel on ARM platforms contained a race condition in certain\nsituations. An attacker in a guest VM could use this to cause a denial of\nservice in the host OS. (CVE-2022-33744)\n","modified":"2026-02-10T04:42:48Z","published":"2022-10-10T22:42:02Z","related":["UBUNTU-CVE-2022-0812","UBUNTU-CVE-2022-1012","UBUNTU-CVE-2022-2318","UBUNTU-CVE-2022-26365","UBUNTU-CVE-2022-32296","UBUNTU-CVE-2022-33740","UBUNTU-CVE-2022-33741","UBUNTU-CVE-2022-33742","UBUNTU-CVE-2022-33744"],"upstream":["CVE-2022-0812","CVE-2022-1012","CVE-2022-2318","CVE-2022-26365","CVE-2022-32296","CVE-2022-33740","CVE-2022-33741","CVE-2022-33742","CVE-2022-33744","UBUNTU-CVE-2022-0812","UBUNTU-CVE-2022-1012","UBUNTU-CVE-2022-2318","UBUNTU-CVE-2022-26365","UBUNTU-CVE-2022-32296","UBUNTU-CVE-2022-33740","UBUNTU-CVE-2022-33741","UBUNTU-CVE-2022-33742","UBUNTU-CVE-2022-33744"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5669-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-0812"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-1012"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-2318"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-26365"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-32296"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-33740"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-33741"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-33742"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-33744"}],"affected":[{"package":{"name":"linux-hwe","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/linux-hwe@4.15.0-194.205~16.04.1?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-194.205~16.04.1"}]}],"versions":["4.8.0-36.36~16.04.1","4.8.0-39.42~16.04.1","4.8.0-41.44~16.04.1","4.8.0-42.45~16.04.1","4.8.0-44.47~16.04.1","4.8.0-45.48~16.04.1","4.8.0-46.49~16.04.1","4.8.0-49.52~16.04.1","4.8.0-51.54~16.04.1","4.8.0-52.55~16.04.1","4.8.0-53.56~16.04.1","4.8.0-54.57~16.04.1","4.8.0-56.61~16.04.1","4.8.0-58.63~16.04.1","4.10.0-27.30~16.04.2","4.10.0-28.32~16.04.2","4.10.0-30.34~16.04.1","4.10.0-32.36~16.04.1","4.10.0-33.37~16.04.1","4.10.0-35.39~16.04.1","4.10.0-37.41~16.04.1","4.10.0-38.42~16.04.1","4.10.0-40.44~16.04.1","4.10.0-42.46~16.04.1","4.13.0-26.29~16.04.2","4.13.0-31.34~16.04.1","4.13.0-32.35~16.04.1","4.13.0-36.40~16.04.1","4.13.0-37.42~16.04.1","4.13.0-38.43~16.04.1","4.13.0-39.44~16.04.1","4.13.0-41.46~16.04.1","4.13.0-43.48~16.04.1","4.13.0-45.50~16.04.1","4.15.0-24.26~16.04.1","4.15.0-29.31~16.04.1","4.15.0-30.32~16.04.1","4.15.0-32.35~16.04.1","4.15.0-33.36~16.04.1","4.15.0-34.37~16.04.1","4.15.0-36.39~16.04.1","4.15.0-38.41~16.04.1","4.15.0-39.42~16.04.1","4.15.0-42.45~16.04.1","4.15.0-43.46~16.04.1","4.15.0-45.48~16.04.1","4.15.0-46.49~16.04.1","4.15.0-47.50~16.04.1","4.15.0-48.51~16.04.1","4.15.0-50.54~16.04.1","4.15.0-51.55~16.04.1","4.15.0-52.56~16.04.1","4.15.0-54.58~16.04.1","4.15.0-55.60~16.04.2","4.15.0-58.64~16.04.1","4.15.0-60.67~16.04.1","4.15.0-62.69~16.04.1","4.15.0-64.73~16.04.1","4.15.0-65.74~16.04.1","4.15.0-66.75~16.04.1","4.15.0-69.78~16.04.1","4.15.0-70.79~16.04.1","4.15.0-72.81~16.04.1","4.15.0-74.83~16.04.1","4.15.0-76.86~16.04.1","4.15.0-88.88~16.04.1","4.15.0-91.92~16.04.1","4.15.0-96.97~16.04.1","4.15.0-99.100~16.04.1","4.15.0-101.102~16.04.1","4.15.0-106.107~16.04.1","4.15.0-107.108~16.04.1","4.15.0-112.113~16.04.1","4.15.0-115.116~16.04.1","4.15.0-117.118~16.04.1","4.15.0-118.119~16.04.1","4.15.0-120.122~16.04.1","4.15.0-122.124~16.04.1","4.15.0-123.126~16.04.1","4.15.0-126.129~16.04.1","4.15.0-128.131~16.04.1","4.15.0-129.132~16.04.1","4.15.0-132.136~16.04.1","4.15.0-133.137~16.04.1","4.15.0-136.140~16.04.1","4.15.0-137.141~16.04.1","4.15.0-139.143~16.04.1","4.15.0-140.144~16.04.1","4.15.0-142.146~16.04.1","4.15.0-143.147~16.04.3","4.15.0-144.148~16.04.1","4.15.0-147.151~16.04.1","4.15.0-151.157~16.04.1","4.15.0-153.160~16.04.1","4.15.0-154.161~16.04.1","4.15.0-156.163~16.04.1","4.15.0-158.166~16.04.1","4.15.0-159.167~16.04.1","4.15.0-161.169~16.04.1","4.15.0-162.170~16.04.1","4.15.0-163.171~16.04.1","4.15.0-166.174~16.04.1","4.15.0-167.175~16.04.1","4.15.0-169.177~16.04.1","4.15.0-171.180~16.04.1","4.15.0-173.182~16.04.1","4.15.0-175.184~16.04.1","4.15.0-176.185~16.04.1","4.15.0-177.186~16.04.1","4.15.0-180.189~16.04.1","4.15.0-184.194~16.04.1","4.15.0-187.198~16.04.1","4.15.0-188.199~16.04.1","4.15.0-189.200~16.04.1","4.15.0-191.202~16.04.1","4.15.0-192.203~16.04.1","4.15.0-193.204~16.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"block-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"crypto-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"dasd-extra-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"dasd-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"fat-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"fb-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"firewire-core-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"floppy-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"fs-core-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"fs-secondary-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"input-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"ipmi-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"irda-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"kernel-image-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"linux-buildinfo-4.15.0-194-generic","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"linux-buildinfo-4.15.0-194-lowlatency","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"linux-cloud-tools-4.15.0-194-generic","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"linux-cloud-tools-4.15.0-194-lowlatency","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"linux-headers-4.15.0-194","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"linux-headers-4.15.0-194-generic","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"linux-headers-4.15.0-194-lowlatency","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"linux-hwe-cloud-tools-4.15.0-194","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"linux-hwe-tools-4.15.0-194","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"linux-hwe-udebs-generic","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"linux-image-4.15.0-194-generic","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"linux-image-unsigned-4.15.0-194-generic","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"linux-image-unsigned-4.15.0-194-lowlatency","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"linux-modules-4.15.0-194-generic","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"linux-modules-4.15.0-194-lowlatency","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"linux-modules-extra-4.15.0-194-generic","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"linux-source-4.15.0","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"linux-tools-4.15.0-194-generic","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"linux-tools-4.15.0-194-lowlatency","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"md-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"message-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"mouse-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"multipath-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"nfs-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"nic-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"nic-pcmcia-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"nic-shared-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"nic-usb-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"parport-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"pata-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"pcmcia-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"pcmcia-storage-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"plip-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"ppp-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"sata-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"scsi-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"serial-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"storage-core-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"usb-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"virtio-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"},{"binary_name":"vlan-modules-4.15.0-194-generic-di","binary_version":"4.15.0-194.205~16.04.1"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5669-2.json","cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"id":"CVE-2022-0812","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-1012","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-2318","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-26365","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-32296","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-33740","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-33741","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-33742","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-33744","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}]}}},{"package":{"name":"linux-oracle","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/linux-oracle@4.15.0-1107.118~16.04.1?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1107.118~16.04.1"}]}],"versions":["4.15.0-1007.9~16.04.1","4.15.0-1008.10~16.04.1","4.15.0-1009.11~16.04.1","4.15.0-1010.12~16.04.1","4.15.0-1011.13~16.04.1","4.15.0-1013.15~16.04.1","4.15.0-1014.16~16.04.1","4.15.0-1015.17~16.04.1","4.15.0-1017.19~16.04.2","4.15.0-1018.20~16.04.1","4.15.0-1021.23~16.04.1","4.15.0-1022.25~16.04.1","4.15.0-1023.26~16.04.1","4.15.0-1025.28~16.04.1","4.15.0-1026.29~16.04.1","4.15.0-1027.30~16.04.1","4.15.0-1029.32~16.04.1","4.15.0-1030.33~16.04.1","4.15.0-1031.34~16.04.1","4.15.0-1033.36~16.04.1","4.15.0-1035.38~16.04.1","4.15.0-1037.41~16.04.1","4.15.0-1038.42~16.04.1","4.15.0-1039.43~16.04.1","4.15.0-1045.49~16.04.1","4.15.0-1046.50~16.04.1","4.15.0-1050.54~16.04.1","4.15.0-1051.55~16.04.1","4.15.0-1053.57~16.04.1","4.15.0-1054.58~16.04.1","4.15.0-1056.61~16.04.1","4.15.0-1058.64~16.04.1","4.15.0-1059.65~16.04.1","4.15.0-1061.67~16.04.1","4.15.0-1062.68~16.04.1","4.15.0-1064.71~16.04.1","4.15.0-1065.73~16.04.1","4.15.0-1066.74~16.04.1","4.15.0-1067.75~16.04.1","4.15.0-1068.76~16.04.1","4.15.0-1069.77~16.04.1","4.15.0-1070.78~16.04.1","4.15.0-1071.79~16.04.1","4.15.0-1072.80~16.04.1","4.15.0-1075.83~16.04.1","4.15.0-1078.86~16.04.1","4.15.0-1079.87~16.04.1","4.15.0-1080.88~16.04.1","4.15.0-1081.89~16.04.1","4.15.0-1082.90~16.04.1","4.15.0-1083.91~16.04.1","4.15.0-1084.92~16.04.1","4.15.0-1085.93~16.04.1","4.15.0-1086.94~16.04.1","4.15.0-1087.95~16.04.1","4.15.0-1089.98~16.04.1","4.15.0-1090.99~16.04.1","4.15.0-1091.100~16.04.1","4.15.0-1092.101~16.04.1","4.15.0-1093.102~16.04.1","4.15.0-1095.104~16.04.1","4.15.0-1098.108~16.04.1","4.15.0-1101.112~16.04.1","4.15.0-1102.113~16.04.1","4.15.0-1104.115~16.04.1","4.15.0-1105.116~16.04.1","4.15.0-1106.117~16.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-buildinfo-4.15.0-1107-oracle","binary_version":"4.15.0-1107.118~16.04.1"},{"binary_name":"linux-headers-4.15.0-1107-oracle","binary_version":"4.15.0-1107.118~16.04.1"},{"binary_name":"linux-image-unsigned-4.15.0-1107-oracle","binary_version":"4.15.0-1107.118~16.04.1"},{"binary_name":"linux-modules-4.15.0-1107-oracle","binary_version":"4.15.0-1107.118~16.04.1"},{"binary_name":"linux-modules-extra-4.15.0-1107-oracle","binary_version":"4.15.0-1107.118~16.04.1"},{"binary_name":"linux-oracle-headers-4.15.0-1107","binary_version":"4.15.0-1107.118~16.04.1"},{"binary_name":"linux-oracle-tools-4.15.0-1107","binary_version":"4.15.0-1107.118~16.04.1"},{"binary_name":"linux-tools-4.15.0-1107-oracle","binary_version":"4.15.0-1107.118~16.04.1"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5669-2.json","cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"id":"CVE-2022-0812","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-1012","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-2318","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-26365","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-32296","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-33740","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-33741","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-33742","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-33744","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]}]}}}],"schema_version":"1.7.3"}