{"id":"USN-5774-1","summary":"linux-azure vulnerabilities","details":"Jann Horn discovered that the Linux kernel did not properly track memory\nallocations for anonymous VMA mappings in some situations, leading to\npotential data structure reuse. A local attacker could use this to cause a\ndenial of service (system crash) or possibly execute arbitrary code.\n(CVE-2022-42703)\n\nIt was discovered that a race condition existed in the instruction emulator\nof the Linux kernel on Arm 64-bit systems. A local attacker could use this\nto cause a denial of service (system crash). (CVE-2022-20422)\n\nIt was discovered that the KVM implementation in the Linux kernel did not\nproperly handle virtual CPUs without APICs in certain situations. A local\nattacker could possibly use this to cause a denial of service (host system\ncrash). (CVE-2022-2153)\n\nHao Sun and Jiacheng Xu discovered that the NILFS file system\nimplementation in the Linux kernel contained a use-after-free\nvulnerability. A local attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2022-2978)\n\nAbhishek Shah discovered a race condition in the PF_KEYv2 implementation in\nthe Linux kernel. A local attacker could use this to cause a denial of\nservice (system crash) or possibly expose sensitive information (kernel\nmemory). (CVE-2022-3028)\n\nIt was discovered that the video4linux driver for Empia based TV cards in\nthe Linux kernel did not properly perform reference counting in some\nsituations, leading to a use-after-free vulnerability. A local attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2022-3239)\n\nIt was discovered that a memory leak existed in the IPv6 implementation of\nthe Linux kernel. A local attacker could use this to cause a denial of\nservice (memory exhaustion). (CVE-2022-3524)\n\nIt was discovered that a race condition existed in the Bluetooth subsystem\nin the Linux kernel, leading to a use-after-free vulnerability. A local\nattacker could use this to cause a denial of service (system crash) or\npossibly execute arbitrary code. (CVE-2022-3564)\n\nIt was discovered that the ISDN implementation of the Linux kernel\ncontained a use-after-free vulnerability. A privileged user could use this\nto cause a denial of service (system crash) or possibly execute arbitrary\ncode. (CVE-2022-3565)\n\nIt was discovered that the TCP implementation in the Linux kernel contained\na data race condition. An attacker could possibly use this to cause\nundesired behaviors. (CVE-2022-3566)\n\nIt was discovered that the IPv6 implementation in the Linux kernel\ncontained a data race condition. An attacker could possibly use this to\ncause undesired behaviors. (CVE-2022-3567)\n\nIt was discovered that the Realtek RTL8152 USB Ethernet adapter driver in\nthe Linux kernel did not properly handle certain error conditions. A local\nattacker with physical access could plug in a specially crafted USB device\nto cause a denial of service (memory exhaustion). (CVE-2022-3594)\n\nIt was discovered that a null pointer dereference existed in the NILFS2\nfile system implementation in the Linux kernel. A local attacker could use\nthis to cause a denial of service (system crash). (CVE-2022-3621)\n\nIt was discovered that the IDT 77252 ATM PCI device driver in the Linux\nkernel did not properly remove any pending timers during device exit,\nresulting in a use-after-free vulnerability. A local attacker could\npossibly use this to cause a denial of service (system crash) or execute\narbitrary code. (CVE-2022-3635)\n\nIt was discovered that the Netlink Transformation (XFRM) subsystem in the\nLinux kernel contained a reference counting error. A local attacker could\nuse this to cause a denial of service (system crash). (CVE-2022-36879)\n\nXingyuan Mo and Gengjia Chen discovered that the Promise SuperTrak EX\nstorage controller driver in the Linux kernel did not properly handle\ncertain structures. A local attacker could potentially use this to expose\nsensitive information (kernel memory). (CVE-2022-40768)\n\n","modified":"2026-04-27T16:28:06.325018Z","published":"2022-12-12T16:34:15Z","related":["UBUNTU-CVE-2022-20422","UBUNTU-CVE-2022-2153","UBUNTU-CVE-2022-2978","UBUNTU-CVE-2022-3028","UBUNTU-CVE-2022-3239","UBUNTU-CVE-2022-3524","UBUNTU-CVE-2022-3564","UBUNTU-CVE-2022-3565","UBUNTU-CVE-2022-3566","UBUNTU-CVE-2022-3567","UBUNTU-CVE-2022-3594","UBUNTU-CVE-2022-3621","UBUNTU-CVE-2022-3635","UBUNTU-CVE-2022-36879","UBUNTU-CVE-2022-40768","UBUNTU-CVE-2022-42703"],"upstream":["CVE-2022-20422","CVE-2022-2153","CVE-2022-2978","CVE-2022-3028","CVE-2022-3239","CVE-2022-3524","CVE-2022-3564","CVE-2022-3565","CVE-2022-3566","CVE-2022-3567","CVE-2022-3594","CVE-2022-3621","CVE-2022-3635","CVE-2022-36879","CVE-2022-40768","CVE-2022-42703","UBUNTU-CVE-2022-20422","UBUNTU-CVE-2022-2153","UBUNTU-CVE-2022-2978","UBUNTU-CVE-2022-3028","UBUNTU-CVE-2022-3239","UBUNTU-CVE-2022-3524","UBUNTU-CVE-2022-3564","UBUNTU-CVE-2022-3565","UBUNTU-CVE-2022-3566","UBUNTU-CVE-2022-3567","UBUNTU-CVE-2022-3594","UBUNTU-CVE-2022-3621","UBUNTU-CVE-2022-3635","UBUNTU-CVE-2022-36879","UBUNTU-CVE-2022-40768","UBUNTU-CVE-2022-42703"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5774-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-2153"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-2978"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3028"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3239"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3524"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3564"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3565"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3566"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3567"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3594"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3621"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3635"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-20422"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-36879"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-40768"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-42703"}],"affected":[{"package":{"name":"linux-azure","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/linux-azure@4.15.0-1157.172~14.04.2?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1157.172~14.04.2"}]}],"versions":["4.15.0-1023.24~14.04.1","4.15.0-1030.31~14.04.1","4.15.0-1031.32~14.04.1","4.15.0-1032.33~14.04.2","4.15.0-1035.36~14.04.2","4.15.0-1036.38~14.04.2","4.15.0-1037.39~14.04.2","4.15.0-1039.41~14.04.2","4.15.0-1040.44~14.04.1","4.15.0-1041.45~14.04.1","4.15.0-1042.46~14.04.1","4.15.0-1045.49~14.04.1","4.15.0-1046.50~14.04.1","4.15.0-1047.51~14.04.1","4.15.0-1049.54~14.04.1","4.15.0-1050.55~14.04.1","4.15.0-1051.56~14.04.1","4.15.0-1052.57~14.04.1","4.15.0-1055.60~14.04.1","4.15.0-1056.61~14.04.1","4.15.0-1057.62~14.04.1","4.15.0-1059.64~14.04.1","4.15.0-1060.65~14.04.1","4.15.0-1061.66~14.04.1","4.15.0-1063.68~14.04.1","4.15.0-1064.69~14.04.1","4.15.0-1066.71~14.04.1","4.15.0-1067.72~14.04.1","4.15.0-1069.74~14.04.1","4.15.0-1071.76~14.04.1","4.15.0-1074.79~14.04.1","4.15.0-1077.82~14.04.1","4.15.0-1082.92~14.04.1","4.15.0-1083.93~14.04.1","4.15.0-1089.99~14.04.1","4.15.0-1091.101~14.04.1","4.15.0-1092.102~14.04.1","4.15.0-1093.103~14.04.1","4.15.0-1095.105~14.04.1","4.15.0-1096.106~14.04.1","4.15.0-1098.109~14.04.1","4.15.0-1100.111~14.04.1","4.15.0-1102.113~14.04.1","4.15.0-1103.114~14.04.1","4.15.0-1106.118~14.04.1","4.15.0-1108.120~14.04.1","4.15.0-1109.121~14.04.1","4.15.0-1110.122~14.04.1","4.15.0-1111.123~14.04.1","4.15.0-1112.124~14.04.1","4.15.0-1113.126~14.04.1","4.15.0-1114.127~14.04.1","4.15.0-1115.128~14.04.1","4.15.0-1118.131~14.04.1","4.15.0-1121.134~14.04.1","4.15.0-1122.135~14.04.1","4.15.0-1123.136~14.04.1","4.15.0-1124.137~14.04.1","4.15.0-1125.138~14.04.1","4.15.0-1126.139~14.04.1","4.15.0-1127.140~14.04.1","4.15.0-1129.142~14.04.1","4.15.0-1130.143~14.04.1","4.15.0-1131.144~14.04.1","4.15.0-1133.146~14.04.1","4.15.0-1134.147~14.04.1","4.15.0-1136.149~14.04.1","4.15.0-1137.150~14.04.1","4.15.0-1138.151~14.04.1","4.15.0-1139.152~14.04.1","4.15.0-1142.156~14.04.1","4.15.0-1145.160~14.04.1","4.15.0-1146.161~14.04.1","4.15.0-1149.164~14.04.1","4.15.0-1150.165~14.04.1","4.15.0-1151.166~14.04.1","4.15.0-1153.168~14.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-azure-cloud-tools-4.15.0-1157","binary_version":"4.15.0-1157.172~14.04.2"},{"binary_name":"linux-azure-headers-4.15.0-1157","binary_version":"4.15.0-1157.172~14.04.2"},{"binary_name":"linux-azure-tools-4.15.0-1157","binary_version":"4.15.0-1157.172~14.04.2"},{"binary_name":"linux-buildinfo-4.15.0-1157-azure","binary_version":"4.15.0-1157.172~14.04.2"},{"binary_name":"linux-cloud-tools-4.15.0-1157-azure","binary_version":"4.15.0-1157.172~14.04.2"},{"binary_name":"linux-headers-4.15.0-1157-azure","binary_version":"4.15.0-1157.172~14.04.2"},{"binary_name":"linux-image-unsigned-4.15.0-1157-azure","binary_version":"4.15.0-1157.172~14.04.2"},{"binary_name":"linux-modules-4.15.0-1157-azure","binary_version":"4.15.0-1157.172~14.04.2"},{"binary_name":"linux-modules-extra-4.15.0-1157-azure","binary_version":"4.15.0-1157.172~14.04.2"},{"binary_name":"linux-tools-4.15.0-1157-azure","binary_version":"4.15.0-1157.172~14.04.2"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5774-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:14.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-2153"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-2978"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-3028"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-3239"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-3524"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-3564"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2022-3565"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-3566"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-3567"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2022-3594"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2022-3621"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2022-3635"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-20422"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-36879"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-40768"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2022-42703"}]}}},{"package":{"name":"linux-azure-4.15","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-azure-4.15@4.15.0-1157.172?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1157.172"}]}],"versions":["4.15.0-1082.92","4.15.0-1083.93","4.15.0-1089.99","4.15.0-1091.101","4.15.0-1092.102","4.15.0-1093.103","4.15.0-1095.105","4.15.0-1096.106","4.15.0-1099.110","4.15.0-1100.111","4.15.0-1102.113","4.15.0-1103.114","4.15.0-1104.116","4.15.0-1106.118","4.15.0-1108.120","4.15.0-1109.121","4.15.0-1110.122","4.15.0-1111.123","4.15.0-1112.125","4.15.0-1113.126","4.15.0-1114.127","4.15.0-1115.128","4.15.0-1118.131","4.15.0-1121.134","4.15.0-1122.135","4.15.0-1123.136","4.15.0-1124.137","4.15.0-1125.138","4.15.0-1126.139","4.15.0-1127.140","4.15.0-1129.142","4.15.0-1130.143","4.15.0-1131.144","4.15.0-1133.146","4.15.0-1134.147","4.15.0-1136.149","4.15.0-1137.150","4.15.0-1138.151","4.15.0-1139.152","4.15.0-1142.156","4.15.0-1145.160","4.15.0-1146.161","4.15.0-1149.164","4.15.0-1150.165","4.15.0-1151.166","4.15.0-1153.168"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-azure-4.15-cloud-tools-4.15.0-1157","binary_version":"4.15.0-1157.172"},{"binary_name":"linux-azure-4.15-headers-4.15.0-1157","binary_version":"4.15.0-1157.172"},{"binary_name":"linux-azure-4.15-tools-4.15.0-1157","binary_version":"4.15.0-1157.172"},{"binary_name":"linux-buildinfo-4.15.0-1157-azure","binary_version":"4.15.0-1157.172"},{"binary_name":"linux-cloud-tools-4.15.0-1157-azure","binary_version":"4.15.0-1157.172"},{"binary_name":"linux-headers-4.15.0-1157-azure","binary_version":"4.15.0-1157.172"},{"binary_name":"linux-image-unsigned-4.15.0-1157-azure","binary_version":"4.15.0-1157.172"},{"binary_name":"linux-modules-4.15.0-1157-azure","binary_version":"4.15.0-1157.172"},{"binary_name":"linux-modules-extra-4.15.0-1157-azure","binary_version":"4.15.0-1157.172"},{"binary_name":"linux-tools-4.15.0-1157-azure","binary_version":"4.15.0-1157.172"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5774-1.json","cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-2153"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-2978"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-3028"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-3239"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-3524"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-3564"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2022-3565"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-3566"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-3567"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2022-3594"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2022-3621"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2022-3635"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-20422"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-36879"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-40768"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2022-42703"}]}}}],"schema_version":"1.7.5"}