{"id":"USN-3777-1","summary":"linux, linux-aws, linux-gcp, linux-kvm, linux-oem, linux-raspi2 vulnerabilities","details":"Jann Horn discovered that the vmacache subsystem did not properly handle\nsequence number overflows, leading to a use-after-free vulnerability. A\nlocal attacker could use this to cause a denial of service (system crash)\nor execute arbitrary code. (CVE-2018-17182)\n\nIt was discovered that the paravirtualization implementation in the Linux\nkernel did not properly handle some indirect calls, reducing the\neffectiveness of Spectre v2 mitigations for paravirtual guests. A local\nattacker could use this to expose sensitive information. (CVE-2018-15594)\n\nIt was discovered that microprocessors utilizing speculative execution and\nprediction of return addresses via Return Stack Buffer (RSB) may allow\nunauthorized memory reads via sidechannel attacks. An attacker could use\nthis to expose sensitive information. (CVE-2018-15572)\n\nAndy Lutomirski and Mika Penttilä discovered that the KVM implementation\nin the Linux kernel did not properly check privilege levels when emulating\nsome instructions. An unprivileged attacker in a guest VM could use this to\nescalate privileges within the guest. (CVE-2018-10853)\n\nIt was discovered that a stack-based buffer overflow existed in the iSCSI\ntarget implementation of the Linux kernel. A remote attacker could use this\nto cause a denial of service (system crash). (CVE-2018-14633)\n\nIt was discovered that a memory leak existed in the IRDA subsystem of the\nLinux kernel. A local attacker could use this to cause a denial of service\n(kernel memory exhaustion). (CVE-2018-6554)\n\nIt was discovered that a use-after-free vulnerability existed in the IRDA\nimplementation in the Linux kernel. A local attacker could use this to\ncause a denial of service (system crash) or possibly execute arbitrary\ncode. (CVE-2018-6555)\n\nUSN 3652-1 added a mitigation for Speculative Store Bypass\na.k.a. Spectre Variant 4 (CVE-2018-3639). This update provides the\ncorresponding mitigation for ARM64 processors. Please note that for\nthis mitigation to be effective, an updated firmware for the processor\nmay be required.\n","modified":"2026-02-10T04:41:26Z","published":"2018-10-01T19:15:42Z","related":["UBUNTU-CVE-2018-10853","UBUNTU-CVE-2018-14633","UBUNTU-CVE-2018-15572","UBUNTU-CVE-2018-15594","UBUNTU-CVE-2018-17182","UBUNTU-CVE-2018-6554","UBUNTU-CVE-2018-6555"],"upstream":["CVE-2018-10853","CVE-2018-14633","CVE-2018-15572","CVE-2018-15594","CVE-2018-17182","CVE-2018-6554","CVE-2018-6555","UBUNTU-CVE-2018-10853","UBUNTU-CVE-2018-14633","UBUNTU-CVE-2018-15572","UBUNTU-CVE-2018-15594","UBUNTU-CVE-2018-17182","UBUNTU-CVE-2018-6554","UBUNTU-CVE-2018-6555"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3777-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-6554"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-6555"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-10853"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14633"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-15572"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-15594"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-17182"}],"affected":[{"package":{"name":"linux","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux@4.15.0-36.39?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-36.39"}]}],"versions":["4.13.0-16.19","4.13.0-17.20","4.13.0-25.29","4.13.0-32.35","4.15.0-10.11","4.15.0-12.13","4.15.0-13.14","4.15.0-15.16","4.15.0-19.20","4.15.0-20.21","4.15.0-22.24","4.15.0-23.25","4.15.0-24.26","4.15.0-29.31","4.15.0-30.32","4.15.0-32.35","4.15.0-33.36","4.15.0-34.37"],"ecosystem_specific":{"binaries":[{"binary_name":"block-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"block-modules-4.15.0-36-generic-lpae-di","binary_version":"4.15.0-36.39"},{"binary_name":"block-modules-4.15.0-36-snapdragon-di","binary_version":"4.15.0-36.39"},{"binary_name":"crypto-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"crypto-modules-4.15.0-36-generic-lpae-di","binary_version":"4.15.0-36.39"},{"binary_name":"crypto-modules-4.15.0-36-snapdragon-di","binary_version":"4.15.0-36.39"},{"binary_name":"dasd-extra-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"dasd-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"fat-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"fat-modules-4.15.0-36-generic-lpae-di","binary_version":"4.15.0-36.39"},{"binary_name":"fat-modules-4.15.0-36-snapdragon-di","binary_version":"4.15.0-36.39"},{"binary_name":"fb-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"firewire-core-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"floppy-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"fs-core-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"fs-core-modules-4.15.0-36-generic-lpae-di","binary_version":"4.15.0-36.39"},{"binary_name":"fs-core-modules-4.15.0-36-snapdragon-di","binary_version":"4.15.0-36.39"},{"binary_name":"fs-secondary-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"fs-secondary-modules-4.15.0-36-generic-lpae-di","binary_version":"4.15.0-36.39"},{"binary_name":"fs-secondary-modules-4.15.0-36-snapdragon-di","binary_version":"4.15.0-36.39"},{"binary_name":"input-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"input-modules-4.15.0-36-generic-lpae-di","binary_version":"4.15.0-36.39"},{"binary_name":"input-modules-4.15.0-36-snapdragon-di","binary_version":"4.15.0-36.39"},{"binary_name":"ipmi-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"ipmi-modules-4.15.0-36-generic-lpae-di","binary_version":"4.15.0-36.39"},{"binary_name":"ipmi-modules-4.15.0-36-snapdragon-di","binary_version":"4.15.0-36.39"},{"binary_name":"irda-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"irda-modules-4.15.0-36-generic-lpae-di","binary_version":"4.15.0-36.39"},{"binary_name":"irda-modules-4.15.0-36-snapdragon-di","binary_version":"4.15.0-36.39"},{"binary_name":"kernel-image-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"kernel-image-4.15.0-36-generic-lpae-di","binary_version":"4.15.0-36.39"},{"binary_name":"kernel-image-4.15.0-36-snapdragon-di","binary_version":"4.15.0-36.39"},{"binary_name":"linux-cloud-tools-4.15.0-36","binary_version":"4.15.0-36.39"},{"binary_name":"linux-cloud-tools-4.15.0-36-generic","binary_version":"4.15.0-36.39"},{"binary_name":"linux-cloud-tools-4.15.0-36-lowlatency","binary_version":"4.15.0-36.39"},{"binary_name":"linux-cloud-tools-common","binary_version":"4.15.0-36.39"},{"binary_name":"linux-headers-4.15.0-36","binary_version":"4.15.0-36.39"},{"binary_name":"linux-headers-4.15.0-36-generic","binary_version":"4.15.0-36.39"},{"binary_name":"linux-headers-4.15.0-36-generic-lpae","binary_version":"4.15.0-36.39"},{"binary_name":"linux-headers-4.15.0-36-lowlatency","binary_version":"4.15.0-36.39"},{"binary_name":"linux-headers-4.15.0-36-snapdragon","binary_version":"4.15.0-36.39"},{"binary_name":"linux-image-4.15.0-36-generic","binary_version":"4.15.0-36.39"},{"binary_name":"linux-image-4.15.0-36-generic-lpae","binary_version":"4.15.0-36.39"},{"binary_name":"linux-image-4.15.0-36-lowlatency","binary_version":"4.15.0-36.39"},{"binary_name":"linux-image-4.15.0-36-snapdragon","binary_version":"4.15.0-36.39"},{"binary_name":"linux-image-unsigned-4.15.0-36-generic","binary_version":"4.15.0-36.39"},{"binary_name":"linux-image-unsigned-4.15.0-36-lowlatency","binary_version":"4.15.0-36.39"},{"binary_name":"linux-libc-dev","binary_version":"4.15.0-36.39"},{"binary_name":"linux-modules-4.15.0-36-generic","binary_version":"4.15.0-36.39"},{"binary_name":"linux-modules-4.15.0-36-generic-lpae","binary_version":"4.15.0-36.39"},{"binary_name":"linux-modules-4.15.0-36-lowlatency","binary_version":"4.15.0-36.39"},{"binary_name":"linux-modules-4.15.0-36-snapdragon","binary_version":"4.15.0-36.39"},{"binary_name":"linux-modules-extra-4.15.0-36-generic","binary_version":"4.15.0-36.39"},{"binary_name":"linux-source-4.15.0","binary_version":"4.15.0-36.39"},{"binary_name":"linux-tools-4.15.0-36","binary_version":"4.15.0-36.39"},{"binary_name":"linux-tools-4.15.0-36-generic","binary_version":"4.15.0-36.39"},{"binary_name":"linux-tools-4.15.0-36-generic-lpae","binary_version":"4.15.0-36.39"},{"binary_name":"linux-tools-4.15.0-36-lowlatency","binary_version":"4.15.0-36.39"},{"binary_name":"linux-tools-4.15.0-36-snapdragon","binary_version":"4.15.0-36.39"},{"binary_name":"linux-tools-common","binary_version":"4.15.0-36.39"},{"binary_name":"linux-tools-host","binary_version":"4.15.0-36.39"},{"binary_name":"linux-udebs-generic","binary_version":"4.15.0-36.39"},{"binary_name":"linux-udebs-generic-lpae","binary_version":"4.15.0-36.39"},{"binary_name":"linux-udebs-snapdragon","binary_version":"4.15.0-36.39"},{"binary_name":"md-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"md-modules-4.15.0-36-generic-lpae-di","binary_version":"4.15.0-36.39"},{"binary_name":"md-modules-4.15.0-36-snapdragon-di","binary_version":"4.15.0-36.39"},{"binary_name":"message-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"message-modules-4.15.0-36-snapdragon-di","binary_version":"4.15.0-36.39"},{"binary_name":"mouse-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"mouse-modules-4.15.0-36-generic-lpae-di","binary_version":"4.15.0-36.39"},{"binary_name":"mouse-modules-4.15.0-36-snapdragon-di","binary_version":"4.15.0-36.39"},{"binary_name":"multipath-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"multipath-modules-4.15.0-36-generic-lpae-di","binary_version":"4.15.0-36.39"},{"binary_name":"multipath-modules-4.15.0-36-snapdragon-di","binary_version":"4.15.0-36.39"},{"binary_name":"nfs-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"nfs-modules-4.15.0-36-generic-lpae-di","binary_version":"4.15.0-36.39"},{"binary_name":"nfs-modules-4.15.0-36-snapdragon-di","binary_version":"4.15.0-36.39"},{"binary_name":"nic-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"nic-modules-4.15.0-36-generic-lpae-di","binary_version":"4.15.0-36.39"},{"binary_name":"nic-modules-4.15.0-36-snapdragon-di","binary_version":"4.15.0-36.39"},{"binary_name":"nic-pcmcia-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"nic-shared-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"nic-shared-modules-4.15.0-36-generic-lpae-di","binary_version":"4.15.0-36.39"},{"binary_name":"nic-shared-modules-4.15.0-36-snapdragon-di","binary_version":"4.15.0-36.39"},{"binary_name":"nic-usb-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"nic-usb-modules-4.15.0-36-generic-lpae-di","binary_version":"4.15.0-36.39"},{"binary_name":"nic-usb-modules-4.15.0-36-snapdragon-di","binary_version":"4.15.0-36.39"},{"binary_name":"parport-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"parport-modules-4.15.0-36-generic-lpae-di","binary_version":"4.15.0-36.39"},{"binary_name":"parport-modules-4.15.0-36-snapdragon-di","binary_version":"4.15.0-36.39"},{"binary_name":"pata-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"pcmcia-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"pcmcia-storage-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"plip-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"plip-modules-4.15.0-36-generic-lpae-di","binary_version":"4.15.0-36.39"},{"binary_name":"plip-modules-4.15.0-36-snapdragon-di","binary_version":"4.15.0-36.39"},{"binary_name":"ppp-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"ppp-modules-4.15.0-36-generic-lpae-di","binary_version":"4.15.0-36.39"},{"binary_name":"ppp-modules-4.15.0-36-snapdragon-di","binary_version":"4.15.0-36.39"},{"binary_name":"sata-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"sata-modules-4.15.0-36-generic-lpae-di","binary_version":"4.15.0-36.39"},{"binary_name":"sata-modules-4.15.0-36-snapdragon-di","binary_version":"4.15.0-36.39"},{"binary_name":"scsi-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"scsi-modules-4.15.0-36-generic-lpae-di","binary_version":"4.15.0-36.39"},{"binary_name":"scsi-modules-4.15.0-36-snapdragon-di","binary_version":"4.15.0-36.39"},{"binary_name":"serial-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"storage-core-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"storage-core-modules-4.15.0-36-generic-lpae-di","binary_version":"4.15.0-36.39"},{"binary_name":"storage-core-modules-4.15.0-36-snapdragon-di","binary_version":"4.15.0-36.39"},{"binary_name":"usb-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"usb-modules-4.15.0-36-generic-lpae-di","binary_version":"4.15.0-36.39"},{"binary_name":"usb-modules-4.15.0-36-snapdragon-di","binary_version":"4.15.0-36.39"},{"binary_name":"virtio-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"virtio-modules-4.15.0-36-snapdragon-di","binary_version":"4.15.0-36.39"},{"binary_name":"vlan-modules-4.15.0-36-generic-di","binary_version":"4.15.0-36.39"},{"binary_name":"vlan-modules-4.15.0-36-generic-lpae-di","binary_version":"4.15.0-36.39"},{"binary_name":"vlan-modules-4.15.0-36-snapdragon-di","binary_version":"4.15.0-36.39"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2018-6554","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2018-6555","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-10853","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-14633","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-15572","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2018-15594","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2018-17182","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3777-1.json"}},{"package":{"name":"linux-aws","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-aws@4.15.0-1023.23?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1023.23"}]}],"versions":["4.15.0-1001.1","4.15.0-1003.3","4.15.0-1005.5","4.15.0-1006.6","4.15.0-1007.7","4.15.0-1009.9","4.15.0-1010.10","4.15.0-1011.11","4.15.0-1016.16","4.15.0-1017.17","4.15.0-1019.19","4.15.0-1020.20","4.15.0-1021.21"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-aws-headers-4.15.0-1023","binary_version":"4.15.0-1023.23"},{"binary_name":"linux-aws-tools-4.15.0-1023","binary_version":"4.15.0-1023.23"},{"binary_name":"linux-headers-4.15.0-1023-aws","binary_version":"4.15.0-1023.23"},{"binary_name":"linux-image-4.15.0-1023-aws","binary_version":"4.15.0-1023.23"},{"binary_name":"linux-modules-4.15.0-1023-aws","binary_version":"4.15.0-1023.23"},{"binary_name":"linux-tools-4.15.0-1023-aws","binary_version":"4.15.0-1023.23"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2018-6554","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2018-6555","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-10853","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-14633","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-15572","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2018-15594","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2018-17182","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3777-1.json"}},{"package":{"name":"linux-gcp","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-gcp@4.15.0-1021.22?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1021.22"}]}],"versions":["4.15.0-1001.1","4.15.0-1003.3","4.15.0-1005.5","4.15.0-1006.6","4.15.0-1008.8","4.15.0-1009.9","4.15.0-1010.10","4.15.0-1014.14","4.15.0-1015.15","4.15.0-1017.18","4.15.0-1018.19","4.15.0-1019.20"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-gcp-headers-4.15.0-1021","binary_version":"4.15.0-1021.22"},{"binary_name":"linux-gcp-tools-4.15.0-1021","binary_version":"4.15.0-1021.22"},{"binary_name":"linux-headers-4.15.0-1021-gcp","binary_version":"4.15.0-1021.22"},{"binary_name":"linux-image-unsigned-4.15.0-1021-gcp","binary_version":"4.15.0-1021.22"},{"binary_name":"linux-modules-4.15.0-1021-gcp","binary_version":"4.15.0-1021.22"},{"binary_name":"linux-modules-extra-4.15.0-1021-gcp","binary_version":"4.15.0-1021.22"},{"binary_name":"linux-tools-4.15.0-1021-gcp","binary_version":"4.15.0-1021.22"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2018-6554","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2018-6555","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-10853","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-14633","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-15572","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2018-15594","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2018-17182","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3777-1.json"}},{"package":{"name":"linux-kvm","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-kvm@4.15.0-1023.23?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1023.23"}]}],"versions":["4.15.0-1002.2","4.15.0-1003.3","4.15.0-1004.4","4.15.0-1006.6","4.15.0-1008.8","4.15.0-1010.10","4.15.0-1011.11","4.15.0-1012.12","4.15.0-1016.16","4.15.0-1017.17","4.15.0-1019.19","4.15.0-1020.20","4.15.0-1021.21"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-headers-4.15.0-1023-kvm","binary_version":"4.15.0-1023.23"},{"binary_name":"linux-image-4.15.0-1023-kvm","binary_version":"4.15.0-1023.23"},{"binary_name":"linux-kvm-headers-4.15.0-1023","binary_version":"4.15.0-1023.23"},{"binary_name":"linux-kvm-tools-4.15.0-1023","binary_version":"4.15.0-1023.23"},{"binary_name":"linux-modules-4.15.0-1023-kvm","binary_version":"4.15.0-1023.23"},{"binary_name":"linux-tools-4.15.0-1023-kvm","binary_version":"4.15.0-1023.23"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2018-6554","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2018-6555","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-10853","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-14633","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-15572","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2018-15594","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2018-17182","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3777-1.json"}},{"package":{"name":"linux-oem","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-oem@4.15.0-1021.24?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1021.24"}]}],"versions":["4.15.0-1002.3","4.15.0-1004.5","4.15.0-1006.9","4.15.0-1008.11","4.15.0-1009.12","4.15.0-1012.15","4.15.0-1013.16","4.15.0-1015.18","4.15.0-1017.20","4.15.0-1018.21"],"ecosystem_specific":{"binaries":[{"binary_name":"block-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"crypto-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"fat-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"fb-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"firewire-core-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"floppy-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"fs-core-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"fs-secondary-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"input-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"ipmi-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"irda-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"kernel-image-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"linux-headers-4.15.0-1021-oem","binary_version":"4.15.0-1021.24"},{"binary_name":"linux-image-unsigned-4.15.0-1021-oem","binary_version":"4.15.0-1021.24"},{"binary_name":"linux-modules-4.15.0-1021-oem","binary_version":"4.15.0-1021.24"},{"binary_name":"linux-oem-headers-4.15.0-1021","binary_version":"4.15.0-1021.24"},{"binary_name":"linux-oem-tools-4.15.0-1021","binary_version":"4.15.0-1021.24"},{"binary_name":"linux-tools-4.15.0-1021-oem","binary_version":"4.15.0-1021.24"},{"binary_name":"linux-udebs-oem","binary_version":"4.15.0-1021.24"},{"binary_name":"md-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"message-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"mouse-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"multipath-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"nfs-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"nic-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"nic-pcmcia-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"nic-shared-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"nic-usb-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"parport-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"pata-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"pcmcia-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"pcmcia-storage-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"plip-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"ppp-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"sata-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"scsi-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"serial-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"storage-core-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"usb-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"virtio-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"},{"binary_name":"vlan-modules-4.15.0-1021-oem-di","binary_version":"4.15.0-1021.24"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2018-6554","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2018-6555","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-10853","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-14633","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-15572","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2018-15594","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2018-17182","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3777-1.json"}},{"package":{"name":"linux-raspi2","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-raspi2@4.15.0-1024.26?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1024.26"}]}],"versions":["4.13.0-1005.5","4.13.0-1006.6","4.13.0-1008.8","4.15.0-1006.7","4.15.0-1009.10","4.15.0-1010.11","4.15.0-1011.12","4.15.0-1012.13","4.15.0-1013.14","4.15.0-1017.18","4.15.0-1018.19","4.15.0-1020.22","4.15.0-1021.23","4.15.0-1022.24"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-headers-4.15.0-1024-raspi2","binary_version":"4.15.0-1024.26"},{"binary_name":"linux-image-4.15.0-1024-raspi2","binary_version":"4.15.0-1024.26"},{"binary_name":"linux-modules-4.15.0-1024-raspi2","binary_version":"4.15.0-1024.26"},{"binary_name":"linux-raspi2-headers-4.15.0-1024","binary_version":"4.15.0-1024.26"},{"binary_name":"linux-raspi2-tools-4.15.0-1024","binary_version":"4.15.0-1024.26"},{"binary_name":"linux-tools-4.15.0-1024-raspi2","binary_version":"4.15.0-1024.26"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2018-6554","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2018-6555","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-10853","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-14633","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2018-15572","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2018-15594","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"high"}]},{"id":"CVE-2018-17182","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3777-1.json"}}],"schema_version":"1.7.3"}