{"id":"USN-6420-1","summary":"vim vulnerabilities","details":"It was discovered that Vim incorrectly handled memory when opening certain\nfiles. If an attacker could trick a user into opening a specially crafted\nfile, it could cause Vim to crash, or possibly execute arbitrary code. This\nissue only affected Ubuntu 22.04 LTS. (CVE-2022-3235, CVE-2022-3278,\nCVE-2022-3297, CVE-2022-3491)\n\nIt was discovered that Vim incorrectly handled memory when opening certain\nfiles. If an attacker could trick a user into opening a specially crafted\nfile, it could cause Vim to crash, or possibly execute arbitrary code. This\nissue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04\nLTS. (CVE-2022-3352, CVE-2022-4292)\n\nIt was discovered that Vim incorrectly handled memory when replacing in\nvirtualedit mode. An attacker could possibly use this issue to cause a\ndenial of service. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04\nLTS, and Ubuntu 22.04 LTS. (CVE-2022-3234)\n\nIt was discovered that Vim incorrectly handled memory when autocmd changes\nmark. An attacker could possibly use this issue to cause a denial of\nservice. (CVE-2022-3256)\n\nIt was discovered that Vim did not properly perform checks on array index\nwith negative width window. An attacker could possibly use this issue to\ncause a denial of service, or execute arbitrary code. (CVE-2022-3324)\n\nIt was discovered that Vim did not properly perform checks on a put command\ncolumn with a visual block. An attacker could possibly use this issue to\ncause a denial of service. This issue only affected Ubuntu 20.04 LTS, and\nUbuntu 22.04 LTS. (CVE-2022-3520)\n\nIt was discovered that Vim incorrectly handled memory when using autocommand\nto open a window. An attacker could possibly use this issue to cause a\ndenial of service. (CVE-2022-3591)\n\nIt was discovered that Vim incorrectly handled memory when updating buffer\nof the component autocmd handler. An attacker could possibly use this issue\nto cause a denial of service. This issue only affected Ubuntu 20.04 LTS,\nand Ubuntu 22.04 LTS. (CVE-2022-3705)\n\nIt was discovered that Vim incorrectly handled floating point comparison\nwith incorrect operator. An attacker could possibly use this issue to cause\na denial of service. This issue only affected Ubuntu 20.04 LTS. and Ubuntu\n22.04 LTS. (CVE-2022-4293)\n","modified":"2026-02-10T04:43:22Z","published":"2023-10-09T04:10:20Z","related":["UBUNTU-CVE-2022-3234","UBUNTU-CVE-2022-3235","UBUNTU-CVE-2022-3256","UBUNTU-CVE-2022-3278","UBUNTU-CVE-2022-3297","UBUNTU-CVE-2022-3324","UBUNTU-CVE-2022-3352","UBUNTU-CVE-2022-3491","UBUNTU-CVE-2022-3520","UBUNTU-CVE-2022-3591","UBUNTU-CVE-2022-3705","UBUNTU-CVE-2022-4292","UBUNTU-CVE-2022-4293"],"upstream":["CVE-2022-3234","CVE-2022-3235","CVE-2022-3256","CVE-2022-3278","CVE-2022-3297","CVE-2022-3324","CVE-2022-3352","CVE-2022-3491","CVE-2022-3520","CVE-2022-3591","CVE-2022-3705","CVE-2022-4292","CVE-2022-4293","UBUNTU-CVE-2022-3234","UBUNTU-CVE-2022-3235","UBUNTU-CVE-2022-3256","UBUNTU-CVE-2022-3278","UBUNTU-CVE-2022-3297","UBUNTU-CVE-2022-3324","UBUNTU-CVE-2022-3352","UBUNTU-CVE-2022-3491","UBUNTU-CVE-2022-3520","UBUNTU-CVE-2022-3591","UBUNTU-CVE-2022-3705","UBUNTU-CVE-2022-4292","UBUNTU-CVE-2022-4293"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6420-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3234"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3235"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3256"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3278"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3297"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3324"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3352"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3491"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3520"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3591"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3705"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-4292"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-4293"}],"affected":[{"package":{"name":"vim","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/vim@2:7.4.052-1ubuntu3.1+esm13?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:7.4.052-1ubuntu3.1+esm13"}]}],"versions":["2:7.4.000-1ubuntu2","2:7.4.052-1ubuntu1","2:7.4.052-1ubuntu2","2:7.4.052-1ubuntu3","2:7.4.052-1ubuntu3.1","2:7.4.052-1ubuntu3.1+esm1","2:7.4.052-1ubuntu3.1+esm3","2:7.4.052-1ubuntu3.1+esm4","2:7.4.052-1ubuntu3.1+esm5","2:7.4.052-1ubuntu3.1+esm6","2:7.4.052-1ubuntu3.1+esm7","2:7.4.052-1ubuntu3.1+esm8","2:7.4.052-1ubuntu3.1+esm9","2:7.4.052-1ubuntu3.1+esm10","2:7.4.052-1ubuntu3.1+esm11","2:7.4.052-1ubuntu3.1+esm12"],"ecosystem_specific":{"binaries":[{"binary_version":"2:7.4.052-1ubuntu3.1+esm13","binary_name":"vim"},{"binary_version":"2:7.4.052-1ubuntu3.1+esm13","binary_name":"vim-athena"},{"binary_version":"2:7.4.052-1ubuntu3.1+esm13","binary_name":"vim-common"},{"binary_version":"2:7.4.052-1ubuntu3.1+esm13","binary_name":"vim-gnome"},{"binary_version":"2:7.4.052-1ubuntu3.1+esm13","binary_name":"vim-gtk"},{"binary_version":"2:7.4.052-1ubuntu3.1+esm13","binary_name":"vim-gui-common"},{"binary_version":"2:7.4.052-1ubuntu3.1+esm13","binary_name":"vim-lesstif"},{"binary_version":"2:7.4.052-1ubuntu3.1+esm13","binary_name":"vim-nox"},{"binary_version":"2:7.4.052-1ubuntu3.1+esm13","binary_name":"vim-runtime"},{"binary_version":"2:7.4.052-1ubuntu3.1+esm13","binary_name":"vim-tiny"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6420-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:14.04:LTS","cves":[{"id":"CVE-2022-3256","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-3324","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-3591","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}]}}},{"package":{"name":"vim","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/vim@2:8.0.1453-1ubuntu1.13+esm5?arch=source&distro=esm-infra/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:8.0.1453-1ubuntu1.13+esm5"}]}],"versions":["2:8.0.0197-4ubuntu5","2:8.0.1144-1ubuntu1","2:8.0.1401-1ubuntu1","2:8.0.1401-1ubuntu2","2:8.0.1401-1ubuntu3","2:8.0.1453-1ubuntu1","2:8.0.1453-1ubuntu1.1","2:8.0.1453-1ubuntu1.3","2:8.0.1453-1ubuntu1.4","2:8.0.1453-1ubuntu1.6","2:8.0.1453-1ubuntu1.7","2:8.0.1453-1ubuntu1.8","2:8.0.1453-1ubuntu1.9","2:8.0.1453-1ubuntu1.10","2:8.0.1453-1ubuntu1.11","2:8.0.1453-1ubuntu1.12","2:8.0.1453-1ubuntu1.13","2:8.0.1453-1ubuntu1.13+esm1","2:8.0.1453-1ubuntu1.13+esm3","2:8.0.1453-1ubuntu1.13+esm4"],"ecosystem_specific":{"binaries":[{"binary_version":"2:8.0.1453-1ubuntu1.13+esm5","binary_name":"vim"},{"binary_version":"2:8.0.1453-1ubuntu1.13+esm5","binary_name":"vim-athena"},{"binary_version":"2:8.0.1453-1ubuntu1.13+esm5","binary_name":"vim-common"},{"binary_version":"2:8.0.1453-1ubuntu1.13+esm5","binary_name":"vim-gnome"},{"binary_version":"2:8.0.1453-1ubuntu1.13+esm5","binary_name":"vim-gtk"},{"binary_version":"2:8.0.1453-1ubuntu1.13+esm5","binary_name":"vim-gtk3"},{"binary_version":"2:8.0.1453-1ubuntu1.13+esm5","binary_name":"vim-gui-common"},{"binary_version":"2:8.0.1453-1ubuntu1.13+esm5","binary_name":"vim-nox"},{"binary_version":"2:8.0.1453-1ubuntu1.13+esm5","binary_name":"vim-runtime"},{"binary_version":"2:8.0.1453-1ubuntu1.13+esm5","binary_name":"vim-tiny"},{"binary_version":"2:8.0.1453-1ubuntu1.13+esm5","binary_name":"xxd"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6420-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:18.04:LTS","cves":[{"id":"CVE-2022-3234","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-3256","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-3324","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-3352","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2022-3591","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2022-4292","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}]}}},{"package":{"name":"vim","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/vim@2:8.1.2269-1ubuntu5.18?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:8.1.2269-1ubuntu5.18"}]}],"versions":["2:8.1.0875-5ubuntu2","2:8.1.0875-5ubuntu3","2:8.1.0875-5ubuntu4","2:8.1.2269-1ubuntu1","2:8.1.2269-1ubuntu4","2:8.1.2269-1ubuntu5","2:8.1.2269-1ubuntu5.3","2:8.1.2269-1ubuntu5.4","2:8.1.2269-1ubuntu5.6","2:8.1.2269-1ubuntu5.7","2:8.1.2269-1ubuntu5.8","2:8.1.2269-1ubuntu5.9","2:8.1.2269-1ubuntu5.11","2:8.1.2269-1ubuntu5.12","2:8.1.2269-1ubuntu5.13","2:8.1.2269-1ubuntu5.14","2:8.1.2269-1ubuntu5.15","2:8.1.2269-1ubuntu5.16","2:8.1.2269-1ubuntu5.17"],"ecosystem_specific":{"binaries":[{"binary_version":"2:8.1.2269-1ubuntu5.18","binary_name":"vim"},{"binary_version":"2:8.1.2269-1ubuntu5.18","binary_name":"vim-athena"},{"binary_version":"2:8.1.2269-1ubuntu5.18","binary_name":"vim-common"},{"binary_version":"2:8.1.2269-1ubuntu5.18","binary_name":"vim-gtk"},{"binary_version":"2:8.1.2269-1ubuntu5.18","binary_name":"vim-gtk3"},{"binary_version":"2:8.1.2269-1ubuntu5.18","binary_name":"vim-gui-common"},{"binary_version":"2:8.1.2269-1ubuntu5.18","binary_name":"vim-nox"},{"binary_version":"2:8.1.2269-1ubuntu5.18","binary_name":"vim-runtime"},{"binary_version":"2:8.1.2269-1ubuntu5.18","binary_name":"vim-tiny"},{"binary_version":"2:8.1.2269-1ubuntu5.18","binary_name":"xxd"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6420-1.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"id":"CVE-2022-3234","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-3256","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-3324","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-3352","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2022-3520","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2022-3591","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2022-3705","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-4292","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2022-4293","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}]}}},{"package":{"name":"vim","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/vim@2:8.2.3995-1ubuntu2.12?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:8.2.3995-1ubuntu2.12"}]}],"versions":["2:8.2.2434-3ubuntu3","2:8.2.2434-3ubuntu4","2:8.2.3565-1ubuntu1","2:8.2.3565-1ubuntu2","2:8.2.3565-1ubuntu3","2:8.2.3565-1ubuntu5","2:8.2.3995-1ubuntu1","2:8.2.3995-1ubuntu2","2:8.2.3995-1ubuntu2.1","2:8.2.3995-1ubuntu2.3","2:8.2.3995-1ubuntu2.4","2:8.2.3995-1ubuntu2.5","2:8.2.3995-1ubuntu2.7","2:8.2.3995-1ubuntu2.8","2:8.2.3995-1ubuntu2.9","2:8.2.3995-1ubuntu2.10","2:8.2.3995-1ubuntu2.11"],"ecosystem_specific":{"binaries":[{"binary_version":"2:8.2.3995-1ubuntu2.12","binary_name":"vim"},{"binary_version":"2:8.2.3995-1ubuntu2.12","binary_name":"vim-athena"},{"binary_version":"2:8.2.3995-1ubuntu2.12","binary_name":"vim-common"},{"binary_version":"2:8.2.3995-1ubuntu2.12","binary_name":"vim-gtk"},{"binary_version":"2:8.2.3995-1ubuntu2.12","binary_name":"vim-gtk3"},{"binary_version":"2:8.2.3995-1ubuntu2.12","binary_name":"vim-gui-common"},{"binary_version":"2:8.2.3995-1ubuntu2.12","binary_name":"vim-nox"},{"binary_version":"2:8.2.3995-1ubuntu2.12","binary_name":"vim-runtime"},{"binary_version":"2:8.2.3995-1ubuntu2.12","binary_name":"vim-tiny"},{"binary_version":"2:8.2.3995-1ubuntu2.12","binary_name":"xxd"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6420-1.json","cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"id":"CVE-2022-3234","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-3235","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-3256","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-3278","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2022-3297","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2022-3324","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-3352","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2022-3491","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2022-3520","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2022-3591","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2022-3705","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-4292","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2022-4293","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]}]}}}],"schema_version":"1.7.3"}