{"id":"USN-3847-2","summary":"linux-hwe, linux-aws-hwe, linux-azure, linux-gcp vulnerabilities","details":"USN-3847-1 fixed vulnerabilities in the Linux kernel for Ubuntu 18.04\nLTS. This update provides the corresponding updates for the Linux\nHardware Enablement (HWE) kernel from Ubuntu 18.04 LTS for Ubuntu\n16.04 LTS.\n\nIt was discovered that a race condition existed in the raw MIDI driver for\nthe Linux kernel, leading to a double free vulnerability. A local attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2018-10902)\n\nIt was discovered that an integer overrun vulnerability existed in the\nPOSIX timers implementation in the Linux kernel. A local attacker could use\nthis to cause a denial of service. (CVE-2018-12896)\n\nNoam Rathaus discovered that a use-after-free vulnerability existed in the\nInfiniband implementation in the Linux kernel. An attacker could use this\nto cause a denial of service (system crash). (CVE-2018-14734)\n\nIt was discovered that the YUREX USB device driver for the Linux kernel did\nnot properly restrict user space reads or writes. A physically proximate\nattacker could use this to cause a denial of service (system crash) or\npossibly execute arbitrary code. (CVE-2018-16276)\n\nIt was discovered that the BPF verifier in the Linux kernel did not\ncorrectly compute numeric bounds in some situations. A local attacker could\nuse this to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2018-18445)\n\nKanda Motohiro discovered that writing extended attributes to an XFS file\nsystem in the Linux kernel in certain situations could cause an error\ncondition to occur. A local attacker could use this to cause a denial of\nservice. (CVE-2018-18690)\n\nIt was discovered that an integer overflow vulnerability existed in the\nCDROM driver of the Linux kernel. A local attacker could use this to expose\nsensitive information (kernel memory). (CVE-2018-18710)\n","modified":"2026-02-10T04:41:27Z","published":"2018-12-20T22:57:45Z","related":["UBUNTU-CVE-2018-10902","UBUNTU-CVE-2018-12896","UBUNTU-CVE-2018-14734","UBUNTU-CVE-2018-16276","UBUNTU-CVE-2018-18445","UBUNTU-CVE-2018-18690","UBUNTU-CVE-2018-18710"],"upstream":["CVE-2018-10902","CVE-2018-12896","CVE-2018-14734","CVE-2018-16276","CVE-2018-18445","CVE-2018-18690","CVE-2018-18710","UBUNTU-CVE-2018-10902","UBUNTU-CVE-2018-12896","UBUNTU-CVE-2018-14734","UBUNTU-CVE-2018-16276","UBUNTU-CVE-2018-18445","UBUNTU-CVE-2018-18690","UBUNTU-CVE-2018-18710"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3847-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-10902"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-12896"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14734"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-16276"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-18445"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-18690"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-18710"}],"affected":[{"package":{"name":"linux-aws-hwe","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/linux-aws-hwe@4.15.0-1031.33~16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1031.33~16.04.1"}]}],"versions":["4.15.0-1030.31~16.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"4.15.0-1031.33~16.04.1","binary_name":"linux-aws-headers-4.15.0-1031"},{"binary_version":"4.15.0-1031.33~16.04.1","binary_name":"linux-aws-hwe-tools-4.15.0-1031"},{"binary_version":"4.15.0-1031.33~16.04.1","binary_name":"linux-buildinfo-4.15.0-1031-aws"},{"binary_version":"4.15.0-1031.33~16.04.1","binary_name":"linux-headers-4.15.0-1031-aws"},{"binary_version":"4.15.0-1031.33~16.04.1","binary_name":"linux-image-4.15.0-1031-aws"},{"binary_version":"4.15.0-1031.33~16.04.1","binary_name":"linux-modules-4.15.0-1031-aws"},{"binary_version":"4.15.0-1031.33~16.04.1","binary_name":"linux-tools-4.15.0-1031-aws"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3847-2.json","cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-10902"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-12896"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-14734"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-16276"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-18445"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-18690"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-18710"}]}}},{"package":{"name":"linux-azure","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/linux-azure@4.15.0-1036.38~16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1036.38~16.04.1"}]}],"versions":["4.11.0-1009.9","4.11.0-1011.11","4.11.0-1013.13","4.11.0-1014.14","4.11.0-1015.15","4.11.0-1016.16","4.13.0-1005.7","4.13.0-1006.8","4.13.0-1007.9","4.13.0-1009.12","4.13.0-1011.14","4.13.0-1012.15","4.13.0-1014.17","4.13.0-1016.19","4.13.0-1018.21","4.15.0-1013.13~16.04.2","4.15.0-1014.14~16.04.1","4.15.0-1018.18~16.04.1","4.15.0-1019.19~16.04.1","4.15.0-1021.21~16.04.1","4.15.0-1022.22~16.04.1","4.15.0-1023.24~16.04.1","4.15.0-1025.26~16.04.1","4.15.0-1028.29~16.04.1","4.15.0-1030.31~16.04.1","4.15.0-1031.32~16.04.1","4.15.0-1032.33~16.04.1","4.15.0-1035.36~16.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"4.15.0-1036.38~16.04.1","binary_name":"linux-azure-cloud-tools-4.15.0-1036"},{"binary_version":"4.15.0-1036.38~16.04.1","binary_name":"linux-azure-headers-4.15.0-1036"},{"binary_version":"4.15.0-1036.38~16.04.1","binary_name":"linux-azure-tools-4.15.0-1036"},{"binary_version":"4.15.0-1036.38~16.04.1","binary_name":"linux-buildinfo-4.15.0-1036-azure"},{"binary_version":"4.15.0-1036.38~16.04.1","binary_name":"linux-cloud-tools-4.15.0-1036-azure"},{"binary_version":"4.15.0-1036.38~16.04.1","binary_name":"linux-headers-4.15.0-1036-azure"},{"binary_version":"4.15.0-1036.38~16.04.1","binary_name":"linux-image-unsigned-4.15.0-1036-azure"},{"binary_version":"4.15.0-1036.38~16.04.1","binary_name":"linux-modules-4.15.0-1036-azure"},{"binary_version":"4.15.0-1036.38~16.04.1","binary_name":"linux-modules-extra-4.15.0-1036-azure"},{"binary_version":"4.15.0-1036.38~16.04.1","binary_name":"linux-tools-4.15.0-1036-azure"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3847-2.json","cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-10902"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-12896"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-14734"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-16276"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-18445"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-18690"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-18710"}]}}},{"package":{"name":"linux-gcp","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/linux-gcp@4.15.0-1026.27~16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1026.27~16.04.1"}]}],"versions":["4.10.0-1004.4","4.10.0-1006.6","4.10.0-1007.7","4.10.0-1008.8","4.10.0-1009.9","4.13.0-1002.5","4.13.0-1006.9","4.13.0-1007.10","4.13.0-1008.11","4.13.0-1011.15","4.13.0-1012.16","4.13.0-1013.17","4.13.0-1015.19","4.13.0-1017.21","4.13.0-1019.23","4.15.0-1014.14~16.04.1","4.15.0-1015.15~16.04.1","4.15.0-1017.18~16.04.1","4.15.0-1018.19~16.04.2","4.15.0-1019.20~16.04.1","4.15.0-1021.22~16.04.1","4.15.0-1023.24~16.04.1","4.15.0-1024.25~16.04.2","4.15.0-1025.26~16.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"4.15.0-1026.27~16.04.1","binary_name":"linux-buildinfo-4.15.0-1026-gcp"},{"binary_version":"4.15.0-1026.27~16.04.1","binary_name":"linux-gcp-headers-4.15.0-1026"},{"binary_version":"4.15.0-1026.27~16.04.1","binary_name":"linux-gcp-tools-4.15.0-1026"},{"binary_version":"4.15.0-1026.27~16.04.1","binary_name":"linux-headers-4.15.0-1026-gcp"},{"binary_version":"4.15.0-1026.27~16.04.1","binary_name":"linux-image-unsigned-4.15.0-1026-gcp"},{"binary_version":"4.15.0-1026.27~16.04.1","binary_name":"linux-modules-4.15.0-1026-gcp"},{"binary_version":"4.15.0-1026.27~16.04.1","binary_name":"linux-modules-extra-4.15.0-1026-gcp"},{"binary_version":"4.15.0-1026.27~16.04.1","binary_name":"linux-tools-4.15.0-1026-gcp"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3847-2.json","cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-10902"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-12896"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-14734"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-16276"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-18445"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-18690"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-18710"}]}}},{"package":{"name":"linux-hwe","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/linux-hwe@4.15.0-43.46~16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-43.46~16.04.1"}]}],"versions":["4.8.0-36.36~16.04.1","4.8.0-39.42~16.04.1","4.8.0-41.44~16.04.1","4.8.0-42.45~16.04.1","4.8.0-44.47~16.04.1","4.8.0-45.48~16.04.1","4.8.0-46.49~16.04.1","4.8.0-49.52~16.04.1","4.8.0-51.54~16.04.1","4.8.0-52.55~16.04.1","4.8.0-53.56~16.04.1","4.8.0-54.57~16.04.1","4.8.0-56.61~16.04.1","4.8.0-58.63~16.04.1","4.10.0-27.30~16.04.2","4.10.0-28.32~16.04.2","4.10.0-30.34~16.04.1","4.10.0-32.36~16.04.1","4.10.0-33.37~16.04.1","4.10.0-35.39~16.04.1","4.10.0-37.41~16.04.1","4.10.0-38.42~16.04.1","4.10.0-40.44~16.04.1","4.10.0-42.46~16.04.1","4.13.0-26.29~16.04.2","4.13.0-31.34~16.04.1","4.13.0-32.35~16.04.1","4.13.0-36.40~16.04.1","4.13.0-37.42~16.04.1","4.13.0-38.43~16.04.1","4.13.0-39.44~16.04.1","4.13.0-41.46~16.04.1","4.13.0-43.48~16.04.1","4.13.0-45.50~16.04.1","4.15.0-24.26~16.04.1","4.15.0-29.31~16.04.1","4.15.0-30.32~16.04.1","4.15.0-32.35~16.04.1","4.15.0-33.36~16.04.1","4.15.0-34.37~16.04.1","4.15.0-36.39~16.04.1","4.15.0-38.41~16.04.1","4.15.0-39.42~16.04.1","4.15.0-42.45~16.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"block-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"block-modules-4.15.0-43-generic-lpae-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"crypto-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"crypto-modules-4.15.0-43-generic-lpae-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"dasd-extra-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"dasd-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"fat-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"fat-modules-4.15.0-43-generic-lpae-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"fb-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"firewire-core-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"floppy-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"fs-core-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"fs-core-modules-4.15.0-43-generic-lpae-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"fs-secondary-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"fs-secondary-modules-4.15.0-43-generic-lpae-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"input-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"input-modules-4.15.0-43-generic-lpae-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"ipmi-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"ipmi-modules-4.15.0-43-generic-lpae-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"irda-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"irda-modules-4.15.0-43-generic-lpae-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"kernel-image-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"kernel-image-4.15.0-43-generic-lpae-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"linux-buildinfo-4.15.0-43-generic"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"linux-buildinfo-4.15.0-43-generic-lpae"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"linux-buildinfo-4.15.0-43-lowlatency"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"linux-cloud-tools-4.15.0-43-generic"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"linux-cloud-tools-4.15.0-43-lowlatency"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"linux-headers-4.15.0-43"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"linux-headers-4.15.0-43-generic"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"linux-headers-4.15.0-43-generic-lpae"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"linux-headers-4.15.0-43-lowlatency"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"linux-hwe-cloud-tools-4.15.0-43"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"linux-hwe-tools-4.15.0-43"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"linux-hwe-udebs-generic"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"linux-hwe-udebs-generic-lpae"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"linux-image-4.15.0-43-generic"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"linux-image-4.15.0-43-generic-lpae"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"linux-image-4.15.0-43-lowlatency"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"linux-image-unsigned-4.15.0-43-generic"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"linux-image-unsigned-4.15.0-43-lowlatency"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"linux-modules-4.15.0-43-generic"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"linux-modules-4.15.0-43-generic-lpae"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"linux-modules-4.15.0-43-lowlatency"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"linux-modules-extra-4.15.0-43-generic"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"linux-source-4.15.0"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"linux-tools-4.15.0-43-generic"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"linux-tools-4.15.0-43-generic-lpae"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"linux-tools-4.15.0-43-lowlatency"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"md-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"md-modules-4.15.0-43-generic-lpae-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"message-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"mouse-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"mouse-modules-4.15.0-43-generic-lpae-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"multipath-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"multipath-modules-4.15.0-43-generic-lpae-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"nfs-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"nfs-modules-4.15.0-43-generic-lpae-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"nic-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"nic-modules-4.15.0-43-generic-lpae-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"nic-pcmcia-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"nic-shared-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"nic-shared-modules-4.15.0-43-generic-lpae-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"nic-usb-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"nic-usb-modules-4.15.0-43-generic-lpae-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"parport-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"parport-modules-4.15.0-43-generic-lpae-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"pata-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"pcmcia-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"pcmcia-storage-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"plip-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"plip-modules-4.15.0-43-generic-lpae-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"ppp-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"ppp-modules-4.15.0-43-generic-lpae-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"sata-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"sata-modules-4.15.0-43-generic-lpae-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"scsi-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"scsi-modules-4.15.0-43-generic-lpae-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"serial-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"storage-core-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"storage-core-modules-4.15.0-43-generic-lpae-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"usb-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"usb-modules-4.15.0-43-generic-lpae-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"virtio-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"vlan-modules-4.15.0-43-generic-di"},{"binary_version":"4.15.0-43.46~16.04.1","binary_name":"vlan-modules-4.15.0-43-generic-lpae-di"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3847-2.json","cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-10902"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-12896"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-14734"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-16276"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-18445"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-18690"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-18710"}]}}}],"schema_version":"1.7.3"}