{"id":"USN-5739-1","summary":"mariadb-10.3, mariadb-10.6 vulnerabilities","details":"Several security issues were discovered in MariaDB and this update\nincludes new upstream MariaDB versions to fix these issues.\n\nMariaDB has been updated to 10.3.37 in Ubuntu 20.04 LTS and to 10.6.11\nin Ubuntu 22.04 LTS and Ubuntu 22.10.\n\nIn addition to security fixes, the updated packages contain bug fixes,\nnew features, and possibly incompatible changes.\n","modified":"2026-04-27T16:32:20.613342154Z","published":"2022-11-23T16:27:18Z","related":["UBUNTU-CVE-2018-25032","UBUNTU-CVE-2021-46669","UBUNTU-CVE-2022-21427","UBUNTU-CVE-2022-27376","UBUNTU-CVE-2022-27377","UBUNTU-CVE-2022-27378","UBUNTU-CVE-2022-27379","UBUNTU-CVE-2022-27380","UBUNTU-CVE-2022-27381","UBUNTU-CVE-2022-27382","UBUNTU-CVE-2022-27383","UBUNTU-CVE-2022-27384","UBUNTU-CVE-2022-27386","UBUNTU-CVE-2022-27387","UBUNTU-CVE-2022-27444","UBUNTU-CVE-2022-27445","UBUNTU-CVE-2022-27446","UBUNTU-CVE-2022-27447","UBUNTU-CVE-2022-27448","UBUNTU-CVE-2022-27449","UBUNTU-CVE-2022-27451","UBUNTU-CVE-2022-27452","UBUNTU-CVE-2022-27455","UBUNTU-CVE-2022-27456","UBUNTU-CVE-2022-27457","UBUNTU-CVE-2022-27458","UBUNTU-CVE-2022-32081","UBUNTU-CVE-2022-32082","UBUNTU-CVE-2022-32083","UBUNTU-CVE-2022-32084","UBUNTU-CVE-2022-32085","UBUNTU-CVE-2022-32086","UBUNTU-CVE-2022-32087","UBUNTU-CVE-2022-32088","UBUNTU-CVE-2022-32089","UBUNTU-CVE-2022-32091"],"upstream":["CVE-2018-25032","CVE-2021-46669","CVE-2022-21427","CVE-2022-27376","CVE-2022-27377","CVE-2022-27378","CVE-2022-27379","CVE-2022-27380","CVE-2022-27381","CVE-2022-27382","CVE-2022-27383","CVE-2022-27384","CVE-2022-27386","CVE-2022-27387","CVE-2022-27444","CVE-2022-27445","CVE-2022-27446","CVE-2022-27447","CVE-2022-27448","CVE-2022-27449","CVE-2022-27451","CVE-2022-27452","CVE-2022-27455","CVE-2022-27456","CVE-2022-27457","CVE-2022-27458","CVE-2022-32081","CVE-2022-32082","CVE-2022-32083","CVE-2022-32084","CVE-2022-32085","CVE-2022-32086","CVE-2022-32087","CVE-2022-32088","CVE-2022-32089","CVE-2022-32091","UBUNTU-CVE-2018-25032","UBUNTU-CVE-2021-46669","UBUNTU-CVE-2022-21427","UBUNTU-CVE-2022-27376","UBUNTU-CVE-2022-27377","UBUNTU-CVE-2022-27378","UBUNTU-CVE-2022-27379","UBUNTU-CVE-2022-27380","UBUNTU-CVE-2022-27381","UBUNTU-CVE-2022-27382","UBUNTU-CVE-2022-27383","UBUNTU-CVE-2022-27384","UBUNTU-CVE-2022-27386","UBUNTU-CVE-2022-27387","UBUNTU-CVE-2022-27444","UBUNTU-CVE-2022-27445","UBUNTU-CVE-2022-27446","UBUNTU-CVE-2022-27447","UBUNTU-CVE-2022-27448","UBUNTU-CVE-2022-27449","UBUNTU-CVE-2022-27451","UBUNTU-CVE-2022-27452","UBUNTU-CVE-2022-27455","UBUNTU-CVE-2022-27456","UBUNTU-CVE-2022-27457","UBUNTU-CVE-2022-27458","UBUNTU-CVE-2022-32081","UBUNTU-CVE-2022-32082","UBUNTU-CVE-2022-32083","UBUNTU-CVE-2022-32084","UBUNTU-CVE-2022-32085","UBUNTU-CVE-2022-32086","UBUNTU-CVE-2022-32087","UBUNTU-CVE-2022-32088","UBUNTU-CVE-2022-32089","UBUNTU-CVE-2022-32091"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5739-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-25032"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-46669"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-21427"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-27376"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-27377"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-27378"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-27379"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-27380"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-27381"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-27382"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-27383"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-27384"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-27386"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-27387"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-27444"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-27445"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-27446"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-27447"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-27448"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-27449"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-27451"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-27452"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-27455"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-27456"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-27457"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-27458"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-32081"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-32082"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-32083"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-32084"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-32085"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-32086"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-32087"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-32088"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-32089"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-32091"}],"affected":[{"package":{"name":"mariadb-10.3","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/mariadb-10.3@1:10.3.37-0ubuntu0.20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:10.3.37-0ubuntu0.20.04.1"}]}],"versions":["1:10.3.17-1","1:10.3.18-1","1:10.3.19-1","1:10.3.21-2","1:10.3.22-1","1:10.3.22-1ubuntu1","1:10.3.25-0ubuntu0.20.04.1","1:10.3.29-0ubuntu0.20.04.1","1:10.3.30-0ubuntu0.20.04.1","1:10.3.31-0ubuntu0.20.04.1","1:10.3.32-0ubuntu0.20.04.1","1:10.3.34-0ubuntu0.20.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"1:10.3.37-0ubuntu0.20.04.1","binary_name":"libmariadb-dev-compat"},{"binary_version":"1:10.3.37-0ubuntu0.20.04.1","binary_name":"libmariadb3"},{"binary_version":"1:10.3.37-0ubuntu0.20.04.1","binary_name":"libmariadbd19"},{"binary_version":"1:10.3.37-0ubuntu0.20.04.1","binary_name":"mariadb-backup"},{"binary_version":"1:10.3.37-0ubuntu0.20.04.1","binary_name":"mariadb-client"},{"binary_version":"1:10.3.37-0ubuntu0.20.04.1","binary_name":"mariadb-client-10.3"},{"binary_version":"1:10.3.37-0ubuntu0.20.04.1","binary_name":"mariadb-client-core-10.3"},{"binary_version":"1:10.3.37-0ubuntu0.20.04.1","binary_name":"mariadb-common"},{"binary_version":"1:10.3.37-0ubuntu0.20.04.1","binary_name":"mariadb-plugin-connect"},{"binary_version":"1:10.3.37-0ubuntu0.20.04.1","binary_name":"mariadb-plugin-cracklib-password-check"},{"binary_version":"1:10.3.37-0ubuntu0.20.04.1","binary_name":"mariadb-plugin-gssapi-client"},{"binary_version":"1:10.3.37-0ubuntu0.20.04.1","binary_name":"mariadb-plugin-gssapi-server"},{"binary_version":"1:10.3.37-0ubuntu0.20.04.1","binary_name":"mariadb-plugin-mroonga"},{"binary_version":"1:10.3.37-0ubuntu0.20.04.1","binary_name":"mariadb-plugin-oqgraph"},{"binary_version":"1:10.3.37-0ubuntu0.20.04.1","binary_name":"mariadb-plugin-rocksdb"},{"binary_version":"1:10.3.37-0ubuntu0.20.04.1","binary_name":"mariadb-plugin-spider"},{"binary_version":"1:10.3.37-0ubuntu0.20.04.1","binary_name":"mariadb-plugin-tokudb"},{"binary_version":"1:10.3.37-0ubuntu0.20.04.1","binary_name":"mariadb-server"},{"binary_version":"1:10.3.37-0ubuntu0.20.04.1","binary_name":"mariadb-server-10.3"},{"binary_version":"1:10.3.37-0ubuntu0.20.04.1","binary_name":"mariadb-server-core-10.3"},{"binary_version":"1:10.3.37-0ubuntu0.20.04.1","binary_name":"mariadb-test"},{"binary_version":"1:10.3.37-0ubuntu0.20.04.1","binary_name":"mariadb-test-data"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5739-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-25032"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-46669"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-21427"},{"id":"CVE-2022-27376","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27377"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27378"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27379"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27380"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27381"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27382"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27383"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27384"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27386"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27387"},{"id":"CVE-2022-27444","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27445"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27446"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27447"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27448"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27449"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27451"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27452"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27455"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27456"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27457"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27458"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-32081"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-32082"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-32083"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-32084"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-32085"},{"id":"CVE-2022-32086","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-32087"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-32088"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-32089"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-32091"}],"ecosystem":"Ubuntu:20.04:LTS"}}},{"package":{"name":"mariadb-10.6","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/mariadb-10.6@1:10.6.11-0ubuntu0.22.04.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:10.6.11-0ubuntu0.22.04.1"}]}],"versions":["1:10.6.7-2ubuntu1","1:10.6.7-2ubuntu1.1"],"ecosystem_specific":{"binaries":[{"binary_version":"1:10.6.11-0ubuntu0.22.04.1","binary_name":"libmariadb-dev-compat"},{"binary_version":"1:10.6.11-0ubuntu0.22.04.1","binary_name":"libmariadb3"},{"binary_version":"1:10.6.11-0ubuntu0.22.04.1","binary_name":"libmariadbd19"},{"binary_version":"1:10.6.11-0ubuntu0.22.04.1","binary_name":"mariadb-backup"},{"binary_version":"1:10.6.11-0ubuntu0.22.04.1","binary_name":"mariadb-client"},{"binary_version":"1:10.6.11-0ubuntu0.22.04.1","binary_name":"mariadb-client-10.6"},{"binary_version":"1:10.6.11-0ubuntu0.22.04.1","binary_name":"mariadb-client-core-10.6"},{"binary_version":"1:10.6.11-0ubuntu0.22.04.1","binary_name":"mariadb-common"},{"binary_version":"1:10.6.11-0ubuntu0.22.04.1","binary_name":"mariadb-plugin-connect"},{"binary_version":"1:10.6.11-0ubuntu0.22.04.1","binary_name":"mariadb-plugin-cracklib-password-check"},{"binary_version":"1:10.6.11-0ubuntu0.22.04.1","binary_name":"mariadb-plugin-gssapi-client"},{"binary_version":"1:10.6.11-0ubuntu0.22.04.1","binary_name":"mariadb-plugin-gssapi-server"},{"binary_version":"1:10.6.11-0ubuntu0.22.04.1","binary_name":"mariadb-plugin-mroonga"},{"binary_version":"1:10.6.11-0ubuntu0.22.04.1","binary_name":"mariadb-plugin-oqgraph"},{"binary_version":"1:10.6.11-0ubuntu0.22.04.1","binary_name":"mariadb-plugin-rocksdb"},{"binary_version":"1:10.6.11-0ubuntu0.22.04.1","binary_name":"mariadb-plugin-s3"},{"binary_version":"1:10.6.11-0ubuntu0.22.04.1","binary_name":"mariadb-plugin-spider"},{"binary_version":"1:10.6.11-0ubuntu0.22.04.1","binary_name":"mariadb-server"},{"binary_version":"1:10.6.11-0ubuntu0.22.04.1","binary_name":"mariadb-server-10.6"},{"binary_version":"1:10.6.11-0ubuntu0.22.04.1","binary_name":"mariadb-server-core-10.6"},{"binary_version":"1:10.6.11-0ubuntu0.22.04.1","binary_name":"mariadb-test"},{"binary_version":"1:10.6.11-0ubuntu0.22.04.1","binary_name":"mariadb-test-data"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5739-1.json","cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-25032"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2021-46669"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-21427"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27376"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27377"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27378"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27379"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27380"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27381"},{"id":"CVE-2022-27382","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27383"},{"id":"CVE-2022-27384","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2022-27386","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27387"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27444"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27445"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27446"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27447"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27448"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27449"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27451"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27452"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27455"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27456"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-27457"},{"id":"CVE-2022-27458","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-32081"},{"id":"CVE-2022-32082","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-32083"},{"id":"CVE-2022-32084","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-32085"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-32086"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-32087"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-32088"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-32089"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2022-32091"}],"ecosystem":"Ubuntu:22.04:LTS"}}}],"schema_version":"1.7.5"}