{"id":"USN-3871-3","summary":"linux-aws, linux-gcp, linux-kvm, linux-oem, linux-raspi2 vulnerabilities","details":"Wen Xu discovered that a use-after-free vulnerability existed in the ext4\nfilesystem implementation in the Linux kernel. An attacker could use this\nto construct a malicious ext4 image that, when mounted, could cause a\ndenial of service (system crash) or possibly execute arbitrary code.\n(CVE-2018-10876, CVE-2018-10879)\n\nWen Xu discovered that a buffer overflow existed in the ext4 filesystem\nimplementation in the Linux kernel. An attacker could use this to construct\na malicious ext4 image that, when mounted, could cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2018-10877)\n\nWen Xu discovered that an out-of-bounds write vulnerability existed in the\next4 filesystem implementation in the Linux kernel. An attacker could use\nthis to construct a malicious ext4 image that, when mounted, could cause a\ndenial of service (system crash) or possibly execute arbitrary code.\n(CVE-2018-10878, CVE-2018-10882)\n\nWen Xu discovered that the ext4 filesystem implementation in the Linux\nkernel did not properly ensure that xattr information remained in inode\nbodies. An attacker could use this to construct a malicious ext4 image\nthat, when mounted, could cause a denial of service (system crash).\n(CVE-2018-10880)\n\nWen Xu discovered that the ext4 file system implementation in the Linux\nkernel could possibly perform an out of bounds write when updating the\njournal for an inline file. An attacker could use this to construct a\nmalicious ext4 image that, when mounted, could cause a denial of service\n(system crash). (CVE-2018-10883)\n\nIt was discovered that a race condition existed in the vsock address family\nimplementation of the Linux kernel that could lead to a use-after-free\ncondition. A local attacker in a guest virtual machine could use this to\nexpose sensitive information (host machine kernel memory). (CVE-2018-14625)\n\nCfir Cohen discovered that a use-after-free vulnerability existed in the\nKVM implementation of the Linux kernel, when handling interrupts in\nenvironments where nested virtualization is in use (nested KVM\nvirtualization is not enabled by default in Ubuntu kernels). A local\nattacker in a guest VM could possibly use this to gain administrative\nprivileges in a host machine. (CVE-2018-16882)\n\nJann Horn discovered that the procfs file system implementation in the\nLinux kernel did not properly restrict the ability to inspect the kernel\nstack of an arbitrary task. A local attacker could use this to expose\nsensitive information. (CVE-2018-17972)\n\nJann Horn discovered that the mremap() system call in the Linux kernel did\nnot properly flush the TLB when completing, potentially leaving access to a\nphysical page after it has been released to the page allocator. A local\nattacker could use this to cause a denial of service (system crash), expose\nsensitive information, or possibly execute arbitrary code. (CVE-2018-18281)\n\nWei Wu discovered that the KVM implementation in the Linux kernel did not\nproperly ensure that ioapics were initialized. A local attacker could use\nthis to cause a denial of service (system crash). (CVE-2018-19407)\n\nIt was discovered that the debug interface for the Linux kernel's HID\nsubsystem did not properly perform bounds checking in some situations. An\nattacker with access to debugfs could use this to cause a denial of service\nor possibly gain additional privileges. (CVE-2018-9516)\n","modified":"2026-02-10T04:41:28Z","published":"2019-02-04T23:00:32Z","related":["UBUNTU-CVE-2018-10876","UBUNTU-CVE-2018-10877","UBUNTU-CVE-2018-10878","UBUNTU-CVE-2018-10879","UBUNTU-CVE-2018-10880","UBUNTU-CVE-2018-10882","UBUNTU-CVE-2018-10883","UBUNTU-CVE-2018-14625","UBUNTU-CVE-2018-16882","UBUNTU-CVE-2018-17972","UBUNTU-CVE-2018-18281","UBUNTU-CVE-2018-19407","UBUNTU-CVE-2018-9516"],"upstream":["CVE-2018-10876","CVE-2018-10877","CVE-2018-10878","CVE-2018-10879","CVE-2018-10880","CVE-2018-10882","CVE-2018-10883","CVE-2018-14625","CVE-2018-16882","CVE-2018-17972","CVE-2018-18281","CVE-2018-19407","CVE-2018-9516","UBUNTU-CVE-2018-10876","UBUNTU-CVE-2018-10877","UBUNTU-CVE-2018-10878","UBUNTU-CVE-2018-10879","UBUNTU-CVE-2018-10880","UBUNTU-CVE-2018-10882","UBUNTU-CVE-2018-10883","UBUNTU-CVE-2018-14625","UBUNTU-CVE-2018-16882","UBUNTU-CVE-2018-17972","UBUNTU-CVE-2018-18281","UBUNTU-CVE-2018-19407","UBUNTU-CVE-2018-9516"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3871-3"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-9516"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-10876"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-10877"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-10878"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-10879"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-10880"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-10882"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-10883"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-14625"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-16882"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-17972"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-18281"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-19407"}],"affected":[{"package":{"name":"linux-aws","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-aws@4.15.0-1032.34?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1032.34"}]}],"versions":["4.15.0-1001.1","4.15.0-1003.3","4.15.0-1005.5","4.15.0-1006.6","4.15.0-1007.7","4.15.0-1009.9","4.15.0-1010.10","4.15.0-1011.11","4.15.0-1016.16","4.15.0-1017.17","4.15.0-1019.19","4.15.0-1020.20","4.15.0-1021.21","4.15.0-1023.23","4.15.0-1025.25","4.15.0-1027.27","4.15.0-1029.30","4.15.0-1031.33"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"linux-aws-cloud-tools-4.15.0-1032","binary_version":"4.15.0-1032.34"},{"binary_name":"linux-aws-headers-4.15.0-1032","binary_version":"4.15.0-1032.34"},{"binary_name":"linux-aws-tools-4.15.0-1032","binary_version":"4.15.0-1032.34"},{"binary_name":"linux-buildinfo-4.15.0-1032-aws","binary_version":"4.15.0-1032.34"},{"binary_name":"linux-cloud-tools-4.15.0-1032-aws","binary_version":"4.15.0-1032.34"},{"binary_name":"linux-headers-4.15.0-1032-aws","binary_version":"4.15.0-1032.34"},{"binary_name":"linux-image-4.15.0-1032-aws","binary_version":"4.15.0-1032.34"},{"binary_name":"linux-modules-4.15.0-1032-aws","binary_version":"4.15.0-1032.34"},{"binary_name":"linux-tools-4.15.0-1032-aws","binary_version":"4.15.0-1032.34"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2018-9516"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10876"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10877"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10878"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10879"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10880"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10882"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10883"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-14625"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-16882"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-17972"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-18281"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-19407"}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3871-3.json"}},{"package":{"name":"linux-gcp","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-gcp@4.15.0-1027.28?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1027.28"}]}],"versions":["4.15.0-1001.1","4.15.0-1003.3","4.15.0-1005.5","4.15.0-1006.6","4.15.0-1008.8","4.15.0-1009.9","4.15.0-1010.10","4.15.0-1014.14","4.15.0-1015.15","4.15.0-1017.18","4.15.0-1018.19","4.15.0-1019.20","4.15.0-1021.22","4.15.0-1023.24","4.15.0-1024.25","4.15.0-1025.26","4.15.0-1026.27"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"linux-buildinfo-4.15.0-1027-gcp","binary_version":"4.15.0-1027.28"},{"binary_name":"linux-gcp-headers-4.15.0-1027","binary_version":"4.15.0-1027.28"},{"binary_name":"linux-gcp-tools-4.15.0-1027","binary_version":"4.15.0-1027.28"},{"binary_name":"linux-headers-4.15.0-1027-gcp","binary_version":"4.15.0-1027.28"},{"binary_name":"linux-image-unsigned-4.15.0-1027-gcp","binary_version":"4.15.0-1027.28"},{"binary_name":"linux-modules-4.15.0-1027-gcp","binary_version":"4.15.0-1027.28"},{"binary_name":"linux-modules-extra-4.15.0-1027-gcp","binary_version":"4.15.0-1027.28"},{"binary_name":"linux-tools-4.15.0-1027-gcp","binary_version":"4.15.0-1027.28"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2018-9516"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10876"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10877"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10878"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10879"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10880"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10882"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10883"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-14625"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-16882"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-17972"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-18281"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-19407"}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3871-3.json"}},{"package":{"name":"linux-kvm","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-kvm@4.15.0-1029.29?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1029.29"}]}],"versions":["4.15.0-1002.2","4.15.0-1003.3","4.15.0-1004.4","4.15.0-1006.6","4.15.0-1008.8","4.15.0-1010.10","4.15.0-1011.11","4.15.0-1012.12","4.15.0-1016.16","4.15.0-1017.17","4.15.0-1019.19","4.15.0-1020.20","4.15.0-1021.21","4.15.0-1023.23","4.15.0-1025.25","4.15.0-1026.26","4.15.0-1027.27","4.15.0-1028.28"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"linux-buildinfo-4.15.0-1029-kvm","binary_version":"4.15.0-1029.29"},{"binary_name":"linux-headers-4.15.0-1029-kvm","binary_version":"4.15.0-1029.29"},{"binary_name":"linux-image-4.15.0-1029-kvm","binary_version":"4.15.0-1029.29"},{"binary_name":"linux-kvm-headers-4.15.0-1029","binary_version":"4.15.0-1029.29"},{"binary_name":"linux-kvm-tools-4.15.0-1029","binary_version":"4.15.0-1029.29"},{"binary_name":"linux-modules-4.15.0-1029-kvm","binary_version":"4.15.0-1029.29"},{"binary_name":"linux-tools-4.15.0-1029-kvm","binary_version":"4.15.0-1029.29"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2018-9516"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10876"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10877"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10878"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10879"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10880"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10882"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10883"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-14625"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-16882"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-17972"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-18281"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-19407"}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3871-3.json"}},{"package":{"name":"linux-oem","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-oem@4.15.0-1033.38?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1033.38"}]}],"versions":["4.15.0-1002.3","4.15.0-1004.5","4.15.0-1006.9","4.15.0-1008.11","4.15.0-1009.12","4.15.0-1012.15","4.15.0-1013.16","4.15.0-1015.18","4.15.0-1017.20","4.15.0-1018.21","4.15.0-1021.24","4.15.0-1024.29","4.15.0-1026.31","4.15.0-1028.33","4.15.0-1030.35"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"block-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"crypto-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"fat-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"fb-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"firewire-core-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"floppy-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"fs-core-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"fs-secondary-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"input-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"ipmi-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"irda-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"kernel-image-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"linux-buildinfo-4.15.0-1033-oem","binary_version":"4.15.0-1033.38"},{"binary_name":"linux-headers-4.15.0-1033-oem","binary_version":"4.15.0-1033.38"},{"binary_name":"linux-image-unsigned-4.15.0-1033-oem","binary_version":"4.15.0-1033.38"},{"binary_name":"linux-modules-4.15.0-1033-oem","binary_version":"4.15.0-1033.38"},{"binary_name":"linux-oem-headers-4.15.0-1033","binary_version":"4.15.0-1033.38"},{"binary_name":"linux-oem-tools-4.15.0-1033","binary_version":"4.15.0-1033.38"},{"binary_name":"linux-tools-4.15.0-1033-oem","binary_version":"4.15.0-1033.38"},{"binary_name":"linux-udebs-oem","binary_version":"4.15.0-1033.38"},{"binary_name":"md-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"message-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"mouse-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"multipath-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"nfs-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"nic-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"nic-pcmcia-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"nic-shared-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"nic-usb-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"parport-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"pata-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"pcmcia-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"pcmcia-storage-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"plip-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"ppp-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"sata-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"scsi-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"serial-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"storage-core-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"usb-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"virtio-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"},{"binary_name":"vlan-modules-4.15.0-1033-oem-di","binary_version":"4.15.0-1033.38"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2018-9516"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10876"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10877"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10878"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10879"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10880"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10882"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10883"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-14625"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-16882"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-17972"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-18281"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-19407"}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3871-3.json"}},{"package":{"name":"linux-raspi2","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-raspi2@4.15.0-1031.33?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1031.33"}]}],"versions":["4.13.0-1005.5","4.13.0-1006.6","4.13.0-1008.8","4.15.0-1006.7","4.15.0-1009.10","4.15.0-1010.11","4.15.0-1011.12","4.15.0-1012.13","4.15.0-1013.14","4.15.0-1017.18","4.15.0-1018.19","4.15.0-1020.22","4.15.0-1021.23","4.15.0-1022.24","4.15.0-1024.26","4.15.0-1026.28","4.15.0-1027.29","4.15.0-1028.30","4.15.0-1029.31","4.15.0-1030.32"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"linux-buildinfo-4.15.0-1031-raspi2","binary_version":"4.15.0-1031.33"},{"binary_name":"linux-headers-4.15.0-1031-raspi2","binary_version":"4.15.0-1031.33"},{"binary_name":"linux-image-4.15.0-1031-raspi2","binary_version":"4.15.0-1031.33"},{"binary_name":"linux-modules-4.15.0-1031-raspi2","binary_version":"4.15.0-1031.33"},{"binary_name":"linux-raspi2-headers-4.15.0-1031","binary_version":"4.15.0-1031.33"},{"binary_name":"linux-raspi2-tools-4.15.0-1031","binary_version":"4.15.0-1031.33"},{"binary_name":"linux-tools-4.15.0-1031-raspi2","binary_version":"4.15.0-1031.33"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2018-9516"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10876"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10877"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10878"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10879"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10880"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10882"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2018-10883"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-14625"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-16882"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-17972"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-18281"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-19407"}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3871-3.json"}}],"schema_version":"1.7.3"}