{"id":"USN-3619-2","summary":"linux-lts-xenial, linux-aws vulnerabilities","details":"USN-3619-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04\nLTS. This update provides the corresponding updates for the Linux\nHardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu\n14.04 LTS.\n\nJann Horn discovered that the Berkeley Packet Filter (BPF) implementation\nin the Linux kernel improperly performed sign extension in some situations.\nA local attacker could use this to cause a denial of service (system crash)\nor possibly execute arbitrary code. (CVE-2017-16995)\n\nIt was discovered that a race condition leading to a use-after-free\nvulnerability existed in the ALSA PCM subsystem of the Linux kernel. A\nlocal attacker could use this to cause a denial of service (system crash)\nor possibly execute arbitrary code. (CVE-2017-0861)\n\nIt was discovered that the KVM implementation in the Linux kernel allowed\npassthrough of the diagnostic I/O port 0x80. An attacker in a guest VM\ncould use this to cause a denial of service (system crash) in the host OS.\n(CVE-2017-1000407)\n\nIt was discovered that an information disclosure vulnerability existed in\nthe ACPI implementation of the Linux kernel. A local attacker could use\nthis to expose sensitive information (kernel memory addresses).\n(CVE-2017-11472)\n\nIt was discovered that a use-after-free vulnerability existed in the\nnetwork namespaces implementation in the Linux kernel. A local attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2017-15129)\n\nIt was discovered that the Advanced Linux Sound Architecture (ALSA)\nsubsystem in the Linux kernel contained a use-after-free when handling\ndevice removal. A physically proximate attacker could use this to cause a\ndenial of service (system crash) or possibly execute arbitrary code.\n(CVE-2017-16528)\n\nAndrey Konovalov discovered that the usbtest device driver in the Linux\nkernel did not properly validate endpoint metadata. A physically proximate\nattacker could use this to cause a denial of service (system crash).\n(CVE-2017-16532)\n\nAndrey Konovalov discovered that the Conexant cx231xx USB video capture\ndriver in the Linux kernel did not properly validate interface descriptors.\nA physically proximate attacker could use this to cause a denial of service\n(system crash). (CVE-2017-16536)\n\nAndrey Konovalov discovered that the SoundGraph iMON USB driver in the\nLinux kernel did not properly validate device metadata. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). (CVE-2017-16537)\n\nAndrey Konovalov discovered that the IMS Passenger Control Unit USB driver\nin the Linux kernel did not properly validate device descriptors. A\nphysically proximate attacker could use this to cause a denial of service\n(system crash). (CVE-2017-16645)\n\nAndrey Konovalov discovered that the DiBcom DiB0700 USB DVB driver in the\nLinux kernel did not properly handle detach events. A physically proximate\nattacker could use this to cause a denial of service (system crash).\n(CVE-2017-16646)\n\nAndrey Konovalov discovered that the CDC USB Ethernet driver did not\nproperly validate device descriptors. A physically proximate attacker could\nuse this to cause a denial of service (system crash). (CVE-2017-16649)\n\nAndrey Konovalov discovered that the QMI WWAN USB driver did not properly\nvalidate device descriptors. A physically proximate attacker could use this\nto cause a denial of service (system crash). (CVE-2017-16650)\n\nIt was discovered that the USB Virtual Host Controller Interface (VHCI)\ndriver in the Linux kernel contained an information disclosure\nvulnerability. A physically proximate attacker could use this to expose\nsensitive information (kernel memory). (CVE-2017-16911)\n\nIt was discovered that the USB over IP implementation in the Linux kernel\ndid not validate endpoint numbers. A remote attacker could use this to\ncause a denial of service (system crash). (CVE-2017-16912)\n\nIt was discovered that the USB over IP implementation in the Linux kernel\ndid not properly validate CMD_SUBMIT packets. A remote attacker could use\nthis to cause a denial of service (excessive memory consumption).\n(CVE-2017-16913)\n\nIt was discovered that the USB over IP implementation in the Linux kernel\ncontained a NULL pointer dereference error. A remote attacker could use\nthis to cause a denial of service (system crash). (CVE-2017-16914)\n\nIt was discovered that the HugeTLB component of the Linux kernel did not\nproperly handle holes in hugetlb ranges. A local attacker could use this to\nexpose sensitive information (kernel memory). (CVE-2017-16994)\n\nIt was discovered that the netfilter component of the Linux did not\nproperly restrict access to the connection tracking helpers list. A local\nattacker could use this to bypass intended access restrictions.\n(CVE-2017-17448)\n\nIt was discovered that the netlink subsystem in the Linux kernel did not\nproperly restrict observations of netlink messages to the appropriate net\nnamespace. A local attacker could use this to expose sensitive information\n(kernel netlink traffic). (CVE-2017-17449)\n\nIt was discovered that the netfilter passive OS fingerprinting (xt_osf)\nmodule did not properly perform access control checks. A local attacker\ncould improperly modify the system-wide OS fingerprint list.\n(CVE-2017-17450)\n\nIt was discovered that the core USB subsystem in the Linux kernel did not\nvalidate the number of configurations and interfaces in a device. A\nphysically proximate attacker could use this to cause a denial of service\n(system crash). (CVE-2017-17558)\n\nDmitry Vyukov discovered that the KVM implementation in the Linux kernel\ncontained an out-of-bounds read when handling memory-mapped I/O. A local\nattacker could use this to expose sensitive information. (CVE-2017-17741)\n\nIt was discovered that the Salsa20 encryption algorithm implementations in\nthe Linux kernel did not properly handle zero-length inputs. A local\nattacker could use this to cause a denial of service (system crash).\n(CVE-2017-17805)\n\nIt was discovered that the HMAC implementation did not validate the state\nof the underlying cryptographic hash algorithm. A local attacker could use\nthis to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2017-17806)\n\nIt was discovered that the keyring implementation in the Linux kernel did\nnot properly check permissions when a key request was performed on a task's\ndefault keyring. A local attacker could use this to add keys to\nunauthorized keyrings. (CVE-2017-17807)\n\nAlexei Starovoitov discovered that the Berkeley Packet Filter (BPF)\nimplementation in the Linux kernel contained a branch-pruning logic issue\naround unreachable code. A local attacker could use this to cause a denial\nof service. (CVE-2017-17862)\n\nIt was discovered that the parallel cryptography component of the Linux\nkernel incorrectly freed kernel memory. A local attacker could use this to\ncause a denial of service (system crash) or possibly execute arbitrary\ncode. (CVE-2017-18075)\n\nIt was discovered that a race condition existed in the Device Mapper\ncomponent of the Linux kernel. A local attacker could use this to cause a\ndenial of service (system crash). (CVE-2017-18203)\n\nIt was discovered that a race condition existed in the OCFS2 file system\nimplementation in the Linux kernel. A local attacker could use this to\ncause a denial of service (kernel deadlock). (CVE-2017-18204)\n\nIt was discovered that an infinite loop could occur in the madvise(2)\nimplementation in the Linux kernel in certain circumstances. A local\nattacker could use this to cause a denial of service (system hang).\n(CVE-2017-18208)\n\nAndy Lutomirski discovered that the KVM implementation in the Linux kernel\nwas vulnerable to a debug exception error when single-stepping through a\nsyscall. A local attacker in a non-Linux guest vm could possibly use this\nto gain administrative privileges in the guest vm. (CVE-2017-7518)\n\nIt was discovered that the Broadcom NetXtremeII ethernet driver in the\nLinux kernel did not properly validate Generic Segment Offload (GSO) packet\nsizes. An attacker could use this to cause a denial of service (interface\nunavailability). (CVE-2018-1000026)\n\nIt was discovered that the Reliable Datagram Socket (RDS) implementation in\nthe Linux kernel contained an out-of-bounds write during RDMA page\nallocation. An attacker could use this to cause a denial of service (system\ncrash) or possibly execute arbitrary code. (CVE-2018-5332)\n\nMohamed Ghannam discovered a null pointer dereference in the RDS (Reliable\nDatagram Sockets) protocol implementation of the Linux kernel. A local\nattacker could use this to cause a denial of service (system crash).\n(CVE-2018-5333)\n\n范龙飞 discovered that a race condition existed in loop block device\nimplementation in the Linux kernel. A local attacker could use this to\ncause a denial of service (system crash) or possibly execute arbitrary\ncode. (CVE-2018-5344)\n\nIt was discovered that an integer overflow error existed in the futex\nimplementation in the Linux kernel. A local attacker could use this to\ncause a denial of service (system crash). (CVE-2018-6927)\n\nIt was discovered that a NULL pointer dereference existed in the RDS\n(Reliable Datagram Sockets) protocol implementation in the Linux kernel. A\nlocal attacker could use this to cause a denial of service (system crash).\n(CVE-2018-7492)\n\nIt was discovered that the Broadcom UniMAC MDIO bus controller driver in\nthe Linux kernel did not properly validate device resources. A local\nattacker could use this to cause a denial of service (system crash).\n(CVE-2018-8043)\n","modified":"2026-02-10T04:41:19Z","published":"2018-04-05T20:14:49Z","related":["UBUNTU-CVE-2017-0861","UBUNTU-CVE-2017-1000407","UBUNTU-CVE-2017-11472","UBUNTU-CVE-2017-15129","UBUNTU-CVE-2017-16528","UBUNTU-CVE-2017-16532","UBUNTU-CVE-2017-16536","UBUNTU-CVE-2017-16537","UBUNTU-CVE-2017-16645","UBUNTU-CVE-2017-16646","UBUNTU-CVE-2017-16649","UBUNTU-CVE-2017-16650","UBUNTU-CVE-2017-16911","UBUNTU-CVE-2017-16912","UBUNTU-CVE-2017-16913","UBUNTU-CVE-2017-16914","UBUNTU-CVE-2017-16994","UBUNTU-CVE-2017-16995","UBUNTU-CVE-2017-17448","UBUNTU-CVE-2017-17449","UBUNTU-CVE-2017-17450","UBUNTU-CVE-2017-17558","UBUNTU-CVE-2017-17741","UBUNTU-CVE-2017-17805","UBUNTU-CVE-2017-17806","UBUNTU-CVE-2017-17807","UBUNTU-CVE-2017-17862","UBUNTU-CVE-2017-18075","UBUNTU-CVE-2017-18203","UBUNTU-CVE-2017-18204","UBUNTU-CVE-2017-18208","UBUNTU-CVE-2017-7518","UBUNTU-CVE-2018-1000026","UBUNTU-CVE-2018-5332","UBUNTU-CVE-2018-5333","UBUNTU-CVE-2018-5344","UBUNTU-CVE-2018-6927","UBUNTU-CVE-2018-7492","UBUNTU-CVE-2018-8043"],"upstream":["CVE-2017-0861","CVE-2017-1000407","CVE-2017-11472","CVE-2017-15129","CVE-2017-16528","CVE-2017-16532","CVE-2017-16536","CVE-2017-16537","CVE-2017-16645","CVE-2017-16646","CVE-2017-16649","CVE-2017-16650","CVE-2017-16911","CVE-2017-16912","CVE-2017-16913","CVE-2017-16914","CVE-2017-16994","CVE-2017-16995","CVE-2017-17448","CVE-2017-17449","CVE-2017-17450","CVE-2017-17558","CVE-2017-17741","CVE-2017-17805","CVE-2017-17806","CVE-2017-17807","CVE-2017-17862","CVE-2017-18075","CVE-2017-18203","CVE-2017-18204","CVE-2017-18208","CVE-2017-7518","CVE-2018-1000026","CVE-2018-5332","CVE-2018-5333","CVE-2018-5344","CVE-2018-6927","CVE-2018-7492","CVE-2018-8043","UBUNTU-CVE-2017-0861","UBUNTU-CVE-2017-1000407","UBUNTU-CVE-2017-11472","UBUNTU-CVE-2017-15129","UBUNTU-CVE-2017-16528","UBUNTU-CVE-2017-16532","UBUNTU-CVE-2017-16536","UBUNTU-CVE-2017-16537","UBUNTU-CVE-2017-16645","UBUNTU-CVE-2017-16646","UBUNTU-CVE-2017-16649","UBUNTU-CVE-2017-16650","UBUNTU-CVE-2017-16911","UBUNTU-CVE-2017-16912","UBUNTU-CVE-2017-16913","UBUNTU-CVE-2017-16914","UBUNTU-CVE-2017-16994","UBUNTU-CVE-2017-16995","UBUNTU-CVE-2017-17448","UBUNTU-CVE-2017-17449","UBUNTU-CVE-2017-17450","UBUNTU-CVE-2017-17558","UBUNTU-CVE-2017-17741","UBUNTU-CVE-2017-17805","UBUNTU-CVE-2017-17806","UBUNTU-CVE-2017-17807","UBUNTU-CVE-2017-17862","UBUNTU-CVE-2017-18075","UBUNTU-CVE-2017-18203","UBUNTU-CVE-2017-18204","UBUNTU-CVE-2017-18208","UBUNTU-CVE-2017-7518","UBUNTU-CVE-2018-1000026","UBUNTU-CVE-2018-5332","UBUNTU-CVE-2018-5333","UBUNTU-CVE-2018-5344","UBUNTU-CVE-2018-6927","UBUNTU-CVE-2018-7492","UBUNTU-CVE-2018-8043"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3619-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-0861"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7518"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-11472"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-15129"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16528"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16532"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16536"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16537"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16645"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16646"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16649"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16650"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16911"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16912"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16913"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16914"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16994"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16995"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17448"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17449"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17450"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17558"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17741"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17805"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17806"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17807"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17862"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-18075"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-18203"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-18204"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-18208"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-1000407"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-5332"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-5333"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-5344"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-6927"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-7492"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-8043"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-1000026"}],"affected":[{"package":{"name":"linux-aws","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/linux-aws@4.4.0-1016.16?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-1016.16"}]}],"versions":["4.4.0-1002.2","4.4.0-1003.3","4.4.0-1005.5","4.4.0-1006.6","4.4.0-1009.9","4.4.0-1010.10","4.4.0-1011.11","4.4.0-1012.12","4.4.0-1014.14"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"linux-aws-cloud-tools-4.4.0-1016","binary_version":"4.4.0-1016.16"},{"binary_name":"linux-aws-headers-4.4.0-1016","binary_version":"4.4.0-1016.16"},{"binary_name":"linux-aws-tools-4.4.0-1016","binary_version":"4.4.0-1016.16"},{"binary_name":"linux-cloud-tools-4.4.0-1016-aws","binary_version":"4.4.0-1016.16"},{"binary_name":"linux-headers-4.4.0-1016-aws","binary_version":"4.4.0-1016.16"},{"binary_name":"linux-image-4.4.0-1016-aws","binary_version":"4.4.0-1016.16"},{"binary_name":"linux-tools-4.4.0-1016-aws","binary_version":"4.4.0-1016.16"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3619-2.json","cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-0861"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-7518"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-11472"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-15129"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16528"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16532"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16536"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16537"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16645"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16646"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16649"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16650"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-16911"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-16912"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-16913"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-16914"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-16994"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2017-16995"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17448"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17449"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17450"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-17558"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17741"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17805"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17806"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17807"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17862"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-18075"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-18203"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-18204"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-18208"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-1000407"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-5332"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-5333"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-5344"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-6927"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-7492"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-8043"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-1000026"}]}}},{"package":{"name":"linux-lts-xenial","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/linux-lts-xenial@4.4.0-119.143~14.04.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-119.143~14.04.1"}]}],"versions":["4.4.0-13.29~14.04.1","4.4.0-14.30~14.04.2","4.4.0-15.31~14.04.1","4.4.0-18.34~14.04.1","4.4.0-21.37~14.04.1","4.4.0-22.39~14.04.1","4.4.0-22.40~14.04.1","4.4.0-24.43~14.04.1","4.4.0-28.47~14.04.1","4.4.0-31.50~14.04.1","4.4.0-34.53~14.04.1","4.4.0-36.55~14.04.1","4.4.0-38.57~14.04.1","4.4.0-42.62~14.04.1","4.4.0-45.66~14.04.1","4.4.0-47.68~14.04.1","4.4.0-51.72~14.04.1","4.4.0-53.74~14.04.1","4.4.0-57.78~14.04.1","4.4.0-59.80~14.04.1","4.4.0-62.83~14.04.1","4.4.0-63.84~14.04.2","4.4.0-64.85~14.04.1","4.4.0-66.87~14.04.1","4.4.0-67.88~14.04.1","4.4.0-70.91~14.04.1","4.4.0-71.92~14.04.1","4.4.0-72.93~14.04.1","4.4.0-75.96~14.04.1","4.4.0-78.99~14.04.2","4.4.0-79.100~14.04.1","4.4.0-81.104~14.04.1","4.4.0-83.106~14.04.1","4.4.0-87.110~14.04.1","4.4.0-89.112~14.04.1","4.4.0-91.114~14.04.1","4.4.0-92.115~14.04.1","4.4.0-93.116~14.04.1","4.4.0-96.119~14.04.1","4.4.0-97.120~14.04.1","4.4.0-98.121~14.04.1","4.4.0-101.124~14.04.1","4.4.0-103.126~14.04.1","4.4.0-104.127~14.04.1","4.4.0-108.131~14.04.1","4.4.0-109.132~14.04.1","4.4.0-111.134~14.04.1","4.4.0-112.135~14.04.1","4.4.0-116.140~14.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"block-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"block-modules-4.4.0-119-generic-lpae-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"block-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"block-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"block-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"crypto-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"crypto-modules-4.4.0-119-generic-lpae-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"crypto-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"crypto-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"crypto-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"fat-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"fat-modules-4.4.0-119-generic-lpae-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"fat-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"fat-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"fat-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"fb-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"firewire-core-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"firewire-core-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"firewire-core-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"firewire-core-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"floppy-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"floppy-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"floppy-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"floppy-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"fs-core-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"fs-core-modules-4.4.0-119-generic-lpae-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"fs-core-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"fs-core-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"fs-core-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"fs-secondary-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"fs-secondary-modules-4.4.0-119-generic-lpae-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"fs-secondary-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"fs-secondary-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"fs-secondary-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"input-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"input-modules-4.4.0-119-generic-lpae-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"input-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"input-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"input-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"ipmi-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"ipmi-modules-4.4.0-119-generic-lpae-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"ipmi-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"ipmi-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"ipmi-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"irda-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"irda-modules-4.4.0-119-generic-lpae-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"irda-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"irda-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"irda-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"kernel-image-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"kernel-image-4.4.0-119-generic-lpae-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"kernel-image-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"kernel-image-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"kernel-image-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-cloud-tools-4.4.0-119-generic","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-cloud-tools-4.4.0-119-lowlatency","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-headers-4.4.0-119","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-headers-4.4.0-119-generic","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-headers-4.4.0-119-generic-lpae","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-headers-4.4.0-119-lowlatency","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-headers-4.4.0-119-powerpc-e500mc","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-headers-4.4.0-119-powerpc-smp","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-headers-4.4.0-119-powerpc64-emb","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-headers-4.4.0-119-powerpc64-smp","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-image-4.4.0-119-generic","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-image-4.4.0-119-generic-lpae","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-image-4.4.0-119-lowlatency","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-image-4.4.0-119-powerpc-e500mc","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-image-4.4.0-119-powerpc-smp","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-image-4.4.0-119-powerpc64-emb","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-image-4.4.0-119-powerpc64-smp","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-image-extra-4.4.0-119-generic","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-lts-xenial-cloud-tools-4.4.0-119","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-lts-xenial-tools-4.4.0-119","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-lts-xenial-udebs-generic","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-lts-xenial-udebs-generic-lpae","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-lts-xenial-udebs-powerpc-e500mc","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-lts-xenial-udebs-powerpc-smp","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-lts-xenial-udebs-powerpc64-smp","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-tools-4.4.0-119-generic","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-tools-4.4.0-119-generic-lpae","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-tools-4.4.0-119-lowlatency","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-tools-4.4.0-119-powerpc-e500mc","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-tools-4.4.0-119-powerpc-smp","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-tools-4.4.0-119-powerpc64-emb","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"linux-tools-4.4.0-119-powerpc64-smp","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"md-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"md-modules-4.4.0-119-generic-lpae-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"md-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"md-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"md-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"message-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"message-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"message-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"message-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"mouse-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"mouse-modules-4.4.0-119-generic-lpae-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"mouse-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"mouse-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"mouse-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"multipath-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"multipath-modules-4.4.0-119-generic-lpae-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"multipath-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"multipath-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"multipath-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"nfs-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"nfs-modules-4.4.0-119-generic-lpae-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"nfs-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"nfs-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"nfs-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"nic-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"nic-modules-4.4.0-119-generic-lpae-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"nic-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"nic-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"nic-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"nic-pcmcia-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"nic-shared-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"nic-shared-modules-4.4.0-119-generic-lpae-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"nic-shared-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"nic-shared-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"nic-shared-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"nic-usb-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"nic-usb-modules-4.4.0-119-generic-lpae-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"nic-usb-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"nic-usb-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"nic-usb-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"parport-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"parport-modules-4.4.0-119-generic-lpae-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"parport-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"parport-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"parport-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"pata-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"pata-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"pata-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"pata-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"pcmcia-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"pcmcia-storage-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"plip-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"plip-modules-4.4.0-119-generic-lpae-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"plip-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"plip-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"plip-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"ppp-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"ppp-modules-4.4.0-119-generic-lpae-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"ppp-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"ppp-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"ppp-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"sata-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"sata-modules-4.4.0-119-generic-lpae-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"sata-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"sata-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"sata-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"scsi-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"scsi-modules-4.4.0-119-generic-lpae-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"scsi-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"scsi-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"scsi-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"serial-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"speakup-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"speakup-modules-4.4.0-119-generic-lpae-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"speakup-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"speakup-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"speakup-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"storage-core-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"storage-core-modules-4.4.0-119-generic-lpae-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"storage-core-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"storage-core-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"storage-core-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"usb-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"usb-modules-4.4.0-119-generic-lpae-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"usb-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"usb-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"usb-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"virtio-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"virtio-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"virtio-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"virtio-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"vlan-modules-4.4.0-119-generic-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"vlan-modules-4.4.0-119-generic-lpae-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"vlan-modules-4.4.0-119-powerpc-e500mc-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"vlan-modules-4.4.0-119-powerpc-smp-di","binary_version":"4.4.0-119.143~14.04.1"},{"binary_name":"vlan-modules-4.4.0-119-powerpc64-smp-di","binary_version":"4.4.0-119.143~14.04.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3619-2.json","cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-0861"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-7518"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-11472"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-15129"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16528"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16532"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16536"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16537"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16645"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16646"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16649"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16650"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-16911"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-16912"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-16913"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-16914"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-16994"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}],"id":"CVE-2017-16995"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17448"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17449"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17450"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-17558"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17741"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17805"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17806"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17807"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17862"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-18075"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-18203"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-18204"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-18208"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-1000407"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-5332"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-5333"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-5344"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-6927"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-7492"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-8043"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-1000026"}]}}}],"schema_version":"1.7.3"}