{"id":"USN-3653-2","summary":"linux-hwe, linux-azure, linux-gcp, linux-oem vulnerabilities","details":"USN-3653-1 fixed vulnerabilities and added mitigations in the Linux\nkernel for Ubuntu 17.10. This update provides the corresponding\nupdates for the Linux Hardware Enablement (HWE) kernel from Ubuntu\n17.10 for Ubuntu 16.04 LTS.\n\nJann Horn and Ken Johnson discovered that microprocessors utilizing\nspeculative execution of a memory read may allow unauthorized memory\nreads via a sidechannel attack. This flaw is known as Spectre\nVariant 4. A local attacker could use this to expose sensitive\ninformation, including kernel memory. (CVE-2018-3639)\n\nIt was discovered that the netlink subsystem in the Linux kernel did not\nproperly restrict observations of netlink messages to the appropriate net\nnamespace. A local attacker could use this to expose sensitive information\n(kernel netlink traffic). (CVE-2017-17449)\n\nTuba Yavuz discovered that a double-free error existed in the USBTV007\ndriver of the Linux kernel. A local attacker could use this to cause a\ndenial of service (system crash) or possibly execute arbitrary code.\n(CVE-2017-17975)\n\nIt was discovered that a race condition existed in the Device Mapper\ncomponent of the Linux kernel. A local attacker could use this to cause a\ndenial of service (system crash). (CVE-2017-18203)\n\nIt was discovered that an infinite loop could occur in the madvise(2)\nimplementation in the Linux kernel in certain circumstances. A local\nattacker could use this to cause a denial of service (system hang).\n(CVE-2017-18208)\n\nSilvio Cesare discovered a buffer overwrite existed in the NCPFS\nimplementation in the Linux kernel. A remote attacker controlling a\nmalicious NCPFS server could use this to cause a denial of service (system\ncrash) or possibly execute arbitrary code. (CVE-2018-8822)\n","modified":"2026-02-10T04:41:20Z","published":"2018-05-22T03:32:36Z","related":["UBUNTU-CVE-2017-17449","UBUNTU-CVE-2017-17975","UBUNTU-CVE-2017-18203","UBUNTU-CVE-2017-18208","UBUNTU-CVE-2018-3639","UBUNTU-CVE-2018-8822"],"upstream":["CVE-2017-17449","CVE-2017-17975","CVE-2017-18203","CVE-2017-18208","CVE-2018-3639","CVE-2018-8822","UBUNTU-CVE-2017-17449","UBUNTU-CVE-2017-17975","UBUNTU-CVE-2017-18203","UBUNTU-CVE-2017-18208","UBUNTU-CVE-2018-3639","UBUNTU-CVE-2018-8822"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3653-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17449"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17975"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-18203"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-18208"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-3639"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-8822"}],"affected":[{"package":{"name":"linux-azure","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/linux-azure@4.13.0-1018.21?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.13.0-1018.21"}]}],"versions":["4.11.0-1009.9","4.11.0-1011.11","4.11.0-1013.13","4.11.0-1014.14","4.11.0-1015.15","4.11.0-1016.16","4.13.0-1005.7","4.13.0-1006.8","4.13.0-1007.9","4.13.0-1009.12","4.13.0-1011.14","4.13.0-1012.15","4.13.0-1014.17","4.13.0-1016.19"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"linux-azure-cloud-tools-4.13.0-1018","binary_version":"4.13.0-1018.21"},{"binary_name":"linux-azure-headers-4.13.0-1018","binary_version":"4.13.0-1018.21"},{"binary_name":"linux-azure-tools-4.13.0-1018","binary_version":"4.13.0-1018.21"},{"binary_name":"linux-cloud-tools-4.13.0-1018-azure","binary_version":"4.13.0-1018.21"},{"binary_name":"linux-headers-4.13.0-1018-azure","binary_version":"4.13.0-1018.21"},{"binary_name":"linux-image-4.13.0-1018-azure","binary_version":"4.13.0-1018.21"},{"binary_name":"linux-image-extra-4.13.0-1018-azure","binary_version":"4.13.0-1018.21"},{"binary_name":"linux-tools-4.13.0-1018-azure","binary_version":"4.13.0-1018.21"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3653-2.json","cves_map":{"cves":[{"id":"CVE-2017-17449","severity":[{"score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-17975","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-18203","severity":[{"score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-18208","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-3639","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-8822","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:16.04:LTS"}}},{"package":{"name":"linux-gcp","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/linux-gcp@4.13.0-1017.21?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.13.0-1017.21"}]}],"versions":["4.10.0-1004.4","4.10.0-1006.6","4.10.0-1007.7","4.10.0-1008.8","4.10.0-1009.9","4.13.0-1002.5","4.13.0-1006.9","4.13.0-1007.10","4.13.0-1008.11","4.13.0-1011.15","4.13.0-1012.16","4.13.0-1013.17","4.13.0-1015.19"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"linux-cloud-tools-4.13.0-1017-gcp","binary_version":"4.13.0-1017.21"},{"binary_name":"linux-gcp-cloud-tools-4.13.0-1017","binary_version":"4.13.0-1017.21"},{"binary_name":"linux-gcp-headers-4.13.0-1017","binary_version":"4.13.0-1017.21"},{"binary_name":"linux-gcp-tools-4.13.0-1017","binary_version":"4.13.0-1017.21"},{"binary_name":"linux-headers-4.13.0-1017-gcp","binary_version":"4.13.0-1017.21"},{"binary_name":"linux-image-4.13.0-1017-gcp","binary_version":"4.13.0-1017.21"},{"binary_name":"linux-image-extra-4.13.0-1017-gcp","binary_version":"4.13.0-1017.21"},{"binary_name":"linux-tools-4.13.0-1017-gcp","binary_version":"4.13.0-1017.21"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3653-2.json","cves_map":{"cves":[{"id":"CVE-2017-17449","severity":[{"score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-17975","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-18203","severity":[{"score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-18208","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-3639","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-8822","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:16.04:LTS"}}},{"package":{"name":"linux-hwe","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/linux-hwe@4.13.0-43.48~16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.13.0-43.48~16.04.1"}]}],"versions":["4.8.0-36.36~16.04.1","4.8.0-39.42~16.04.1","4.8.0-41.44~16.04.1","4.8.0-42.45~16.04.1","4.8.0-44.47~16.04.1","4.8.0-45.48~16.04.1","4.8.0-46.49~16.04.1","4.8.0-49.52~16.04.1","4.8.0-51.54~16.04.1","4.8.0-52.55~16.04.1","4.8.0-53.56~16.04.1","4.8.0-54.57~16.04.1","4.8.0-56.61~16.04.1","4.8.0-58.63~16.04.1","4.10.0-27.30~16.04.2","4.10.0-28.32~16.04.2","4.10.0-30.34~16.04.1","4.10.0-32.36~16.04.1","4.10.0-33.37~16.04.1","4.10.0-35.39~16.04.1","4.10.0-37.41~16.04.1","4.10.0-38.42~16.04.1","4.10.0-40.44~16.04.1","4.10.0-42.46~16.04.1","4.13.0-26.29~16.04.2","4.13.0-31.34~16.04.1","4.13.0-32.35~16.04.1","4.13.0-36.40~16.04.1","4.13.0-37.42~16.04.1","4.13.0-38.43~16.04.1","4.13.0-39.44~16.04.1","4.13.0-41.46~16.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"block-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"block-modules-4.13.0-43-generic-lpae-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"crypto-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"crypto-modules-4.13.0-43-generic-lpae-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"dasd-extra-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"dasd-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"fat-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"fat-modules-4.13.0-43-generic-lpae-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"fb-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"firewire-core-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"floppy-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"fs-core-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"fs-core-modules-4.13.0-43-generic-lpae-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"fs-secondary-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"fs-secondary-modules-4.13.0-43-generic-lpae-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"input-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"input-modules-4.13.0-43-generic-lpae-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"ipmi-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"ipmi-modules-4.13.0-43-generic-lpae-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"irda-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"irda-modules-4.13.0-43-generic-lpae-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"kernel-image-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"kernel-image-4.13.0-43-generic-lpae-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"linux-cloud-tools-4.13.0-43-generic","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"linux-cloud-tools-4.13.0-43-lowlatency","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"linux-headers-4.13.0-43","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"linux-headers-4.13.0-43-generic","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"linux-headers-4.13.0-43-generic-lpae","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"linux-headers-4.13.0-43-lowlatency","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"linux-hwe-cloud-tools-4.13.0-43","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"linux-hwe-tools-4.13.0-43","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"linux-hwe-udebs-generic","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"linux-hwe-udebs-generic-lpae","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"linux-image-4.13.0-43-generic","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"linux-image-4.13.0-43-generic-lpae","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"linux-image-4.13.0-43-lowlatency","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"linux-image-extra-4.13.0-43-generic","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"linux-source-4.13.0","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"linux-tools-4.13.0-43-generic","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"linux-tools-4.13.0-43-generic-lpae","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"linux-tools-4.13.0-43-lowlatency","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"md-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"md-modules-4.13.0-43-generic-lpae-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"message-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"mouse-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"mouse-modules-4.13.0-43-generic-lpae-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"multipath-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"multipath-modules-4.13.0-43-generic-lpae-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"nfs-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"nfs-modules-4.13.0-43-generic-lpae-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"nic-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"nic-modules-4.13.0-43-generic-lpae-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"nic-pcmcia-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"nic-shared-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"nic-shared-modules-4.13.0-43-generic-lpae-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"nic-usb-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"nic-usb-modules-4.13.0-43-generic-lpae-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"parport-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"parport-modules-4.13.0-43-generic-lpae-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"pata-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"pcmcia-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"pcmcia-storage-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"plip-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"plip-modules-4.13.0-43-generic-lpae-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"ppp-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"ppp-modules-4.13.0-43-generic-lpae-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"sata-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"sata-modules-4.13.0-43-generic-lpae-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"scsi-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"scsi-modules-4.13.0-43-generic-lpae-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"serial-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"storage-core-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"storage-core-modules-4.13.0-43-generic-lpae-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"usb-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"usb-modules-4.13.0-43-generic-lpae-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"virtio-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"vlan-modules-4.13.0-43-generic-di","binary_version":"4.13.0-43.48~16.04.1"},{"binary_name":"vlan-modules-4.13.0-43-generic-lpae-di","binary_version":"4.13.0-43.48~16.04.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3653-2.json","cves_map":{"cves":[{"id":"CVE-2017-17449","severity":[{"score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-17975","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-18203","severity":[{"score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-18208","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-3639","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-8822","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:16.04:LTS"}}},{"package":{"name":"linux-oem","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/linux-oem@4.13.0-1028.31?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.13.0-1028.31"}]}],"versions":["4.13.0-1008.9","4.13.0-1010.11","4.13.0-1012.13","4.13.0-1015.16","4.13.0-1017.18","4.13.0-1019.20","4.13.0-1020.21","4.13.0-1021.23","4.13.0-1022.24","4.13.0-1024.27","4.13.0-1026.29"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"block-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"crypto-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"fat-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"fb-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"firewire-core-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"floppy-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"fs-core-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"fs-secondary-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"input-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"ipmi-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"irda-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"kernel-image-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"linux-headers-4.13.0-1028-oem","binary_version":"4.13.0-1028.31"},{"binary_name":"linux-image-4.13.0-1028-oem","binary_version":"4.13.0-1028.31"},{"binary_name":"linux-oem-headers-4.13.0-1028","binary_version":"4.13.0-1028.31"},{"binary_name":"linux-oem-tools-4.13.0-1028","binary_version":"4.13.0-1028.31"},{"binary_name":"linux-tools-4.13.0-1028-oem","binary_version":"4.13.0-1028.31"},{"binary_name":"linux-udebs-oem","binary_version":"4.13.0-1028.31"},{"binary_name":"md-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"message-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"mouse-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"multipath-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"nfs-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"nic-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"nic-pcmcia-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"nic-shared-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"nic-usb-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"parport-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"pata-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"pcmcia-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"pcmcia-storage-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"plip-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"ppp-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"sata-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"scsi-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"serial-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"storage-core-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"usb-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"virtio-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"},{"binary_name":"vlan-modules-4.13.0-1028-oem-di","binary_version":"4.13.0-1028.31"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3653-2.json","cves_map":{"cves":[{"id":"CVE-2017-17449","severity":[{"score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-17975","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-18203","severity":[{"score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2017-18208","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-3639","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2018-8822","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:16.04:LTS"}}}],"schema_version":"1.7.3"}