Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation could reassemble mixed encrypted and plaintext fragments. A physically proximate attacker could possibly use this issue to inject packets or exfiltrate selected fragments. (CVE-2020-26147)
It was discovered that the bluetooth subsystem in the Linux kernel did not properly perform access control. An authenticated attacker could possibly use this to expose sensitive information. (CVE-2020-26558, CVE-2021-0129)
It was discovered that the RPA PCI Hotplug driver implementation in the Linux kernel did not properly handle device name writes via sysfs, leading to a buffer overflow. A privileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-28972)
It was discovered that a use-after-free existed in the Bluetooth HCI driver of the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33034)
Norbert Slusarek discovered that the CAN broadcast manger (bcm) protocol implementation in the Linux kernel did not properly initialize memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2021-34693)
马哲宇 discovered that the IEEE 1394 (Firewire) nosy packet sniffer driver in the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-3483)
It was discovered that the bluetooth subsystem in the Linux kernel did not properly handle HCI device initialization failure, leading to a double-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2021-3564)
Murray McAllister discovered that the joystick device interface in the Linux kernel did not properly validate data passed via an ioctl(). A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code on systems with a joystick device registered. (CVE-2021-3612)
It was discovered that the tracing subsystem in the Linux kernel did not properly keep track of per-cpu ring buffer state. A privileged attacker could use this to cause a denial of service. (CVE-2021-3679)
It was discovered that the MAX-3421 host USB device driver in the Linux kernel did not properly handle device removal events. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2021-38204)
It was discovered that the 6pack network protocol driver in the Linux kernel did not properly perform validation checks. A privileged attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2021-42008)
Amit Klein discovered that the IPv6 implementation in the Linux kernel could disclose internal state in some situations. An attacker could possibly use this to expose sensitive information. (CVE-2021-45485)
{
"binaries": [
{
"binary_version": "4.4.0-1099.104",
"binary_name": "linux-aws-cloud-tools-4.4.0-1099"
},
{
"binary_version": "4.4.0-1099.104",
"binary_name": "linux-aws-headers-4.4.0-1099"
},
{
"binary_version": "4.4.0-1099.104",
"binary_name": "linux-aws-tools-4.4.0-1099"
},
{
"binary_version": "4.4.0-1099.104",
"binary_name": "linux-buildinfo-4.4.0-1099-aws"
},
{
"binary_version": "4.4.0-1099.104",
"binary_name": "linux-cloud-tools-4.4.0-1099-aws"
},
{
"binary_version": "4.4.0-1099.104",
"binary_name": "linux-headers-4.4.0-1099-aws"
},
{
"binary_version": "4.4.0-1099.104",
"binary_name": "linux-image-4.4.0-1099-aws"
},
{
"binary_version": "4.4.0-1099.104",
"binary_name": "linux-modules-4.4.0-1099-aws"
},
{
"binary_version": "4.4.0-1099.104",
"binary_name": "linux-tools-4.4.0-1099-aws"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}
{
"ecosystem": "Ubuntu:Pro:14.04:LTS",
"cves": [
{
"id": "CVE-2020-26147",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2020-26558",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-0129",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-3483",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-3564",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-3612",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-3679",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2021-28972",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-33034",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-34693",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2021-38204",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2021-42008",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2021-45485",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"binaries": [
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "block-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "crypto-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "fat-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "fb-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "firewire-core-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "floppy-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "fs-core-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "fs-secondary-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "input-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "ipmi-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "irda-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "kernel-image-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "linux-buildinfo-4.4.0-219-generic"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "linux-buildinfo-4.4.0-219-lowlatency"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "linux-cloud-tools-4.4.0-219-generic"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "linux-cloud-tools-4.4.0-219-lowlatency"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "linux-headers-4.4.0-219"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "linux-headers-4.4.0-219-generic"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "linux-headers-4.4.0-219-lowlatency"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "linux-image-4.4.0-219-generic"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "linux-image-unsigned-4.4.0-219-generic"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "linux-image-unsigned-4.4.0-219-lowlatency"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "linux-lts-xenial-cloud-tools-4.4.0-219"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "linux-lts-xenial-tools-4.4.0-219"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "linux-lts-xenial-udebs-generic"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "linux-modules-4.4.0-219-generic"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "linux-modules-4.4.0-219-lowlatency"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "linux-modules-extra-4.4.0-219-generic"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "linux-tools-4.4.0-219-generic"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "linux-tools-4.4.0-219-lowlatency"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "md-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "message-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "mouse-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "multipath-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "nfs-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "nic-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "nic-pcmcia-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "nic-shared-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "nic-usb-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "parport-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "pata-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "pcmcia-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "pcmcia-storage-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "plip-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "ppp-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "sata-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "scsi-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "serial-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "speakup-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "storage-core-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "usb-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "virtio-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252~14.04.1",
"binary_name": "vlan-modules-4.4.0-219-generic-di"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}
{
"ecosystem": "Ubuntu:Pro:14.04:LTS",
"cves": [
{
"id": "CVE-2020-26147",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2020-26558",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-0129",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-3483",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-3564",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-3612",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-3679",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2021-28972",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-33034",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-34693",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2021-38204",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2021-42008",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2021-45485",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"binaries": [
{
"binary_version": "4.4.0-219.252",
"binary_name": "block-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "crypto-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "dasd-extra-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "dasd-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "fat-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "fb-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "firewire-core-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "floppy-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "fs-core-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "fs-secondary-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "input-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "ipmi-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "irda-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "kernel-image-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "linux-buildinfo-4.4.0-219-generic"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "linux-buildinfo-4.4.0-219-lowlatency"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "linux-cloud-tools-4.4.0-219"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "linux-cloud-tools-4.4.0-219-generic"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "linux-cloud-tools-4.4.0-219-lowlatency"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "linux-cloud-tools-common"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "linux-headers-4.4.0-219"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "linux-headers-4.4.0-219-generic"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "linux-headers-4.4.0-219-lowlatency"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "linux-image-4.4.0-219-generic"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "linux-image-unsigned-4.4.0-219-generic"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "linux-image-unsigned-4.4.0-219-lowlatency"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "linux-libc-dev"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "linux-modules-4.4.0-219-generic"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "linux-modules-4.4.0-219-lowlatency"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "linux-modules-extra-4.4.0-219-generic"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "linux-source-4.4.0"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "linux-tools-4.4.0-219"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "linux-tools-4.4.0-219-generic"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "linux-tools-4.4.0-219-lowlatency"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "linux-tools-common"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "linux-tools-host"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "linux-udebs-generic"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "md-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "message-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "mouse-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "multipath-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "nfs-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "nic-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "nic-pcmcia-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "nic-shared-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "nic-usb-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "parport-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "pata-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "pcmcia-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "pcmcia-storage-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "plip-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "ppp-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "sata-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "scsi-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "serial-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "speakup-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "storage-core-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "usb-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "virtio-modules-4.4.0-219-generic-di"
},
{
"binary_version": "4.4.0-219.252",
"binary_name": "vlan-modules-4.4.0-219-generic-di"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}
{
"ecosystem": "Ubuntu:Pro:16.04:LTS",
"cves": [
{
"id": "CVE-2020-26147",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2020-26558",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-0129",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-3483",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-3564",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-3612",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-3679",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2021-28972",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-33034",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-34693",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2021-38204",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2021-42008",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2021-45485",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"binaries": [
{
"binary_version": "4.4.0-1135.149",
"binary_name": "linux-aws-cloud-tools-4.4.0-1135"
},
{
"binary_version": "4.4.0-1135.149",
"binary_name": "linux-aws-headers-4.4.0-1135"
},
{
"binary_version": "4.4.0-1135.149",
"binary_name": "linux-aws-tools-4.4.0-1135"
},
{
"binary_version": "4.4.0-1135.149",
"binary_name": "linux-buildinfo-4.4.0-1135-aws"
},
{
"binary_version": "4.4.0-1135.149",
"binary_name": "linux-cloud-tools-4.4.0-1135-aws"
},
{
"binary_version": "4.4.0-1135.149",
"binary_name": "linux-headers-4.4.0-1135-aws"
},
{
"binary_version": "4.4.0-1135.149",
"binary_name": "linux-image-4.4.0-1135-aws"
},
{
"binary_version": "4.4.0-1135.149",
"binary_name": "linux-modules-4.4.0-1135-aws"
},
{
"binary_version": "4.4.0-1135.149",
"binary_name": "linux-modules-extra-4.4.0-1135-aws"
},
{
"binary_version": "4.4.0-1135.149",
"binary_name": "linux-tools-4.4.0-1135-aws"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}
{
"ecosystem": "Ubuntu:Pro:16.04:LTS",
"cves": [
{
"id": "CVE-2020-26147",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2020-26558",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-0129",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-3483",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-3564",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-3612",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-3679",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2021-28972",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-33034",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-34693",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2021-38204",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2021-42008",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2021-45485",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"binaries": [
{
"binary_version": "4.4.0-1100.109",
"binary_name": "linux-buildinfo-4.4.0-1100-kvm"
},
{
"binary_version": "4.4.0-1100.109",
"binary_name": "linux-cloud-tools-4.4.0-1100-kvm"
},
{
"binary_version": "4.4.0-1100.109",
"binary_name": "linux-headers-4.4.0-1100-kvm"
},
{
"binary_version": "4.4.0-1100.109",
"binary_name": "linux-image-4.4.0-1100-kvm"
},
{
"binary_version": "4.4.0-1100.109",
"binary_name": "linux-kvm-cloud-tools-4.4.0-1100"
},
{
"binary_version": "4.4.0-1100.109",
"binary_name": "linux-kvm-headers-4.4.0-1100"
},
{
"binary_version": "4.4.0-1100.109",
"binary_name": "linux-kvm-tools-4.4.0-1100"
},
{
"binary_version": "4.4.0-1100.109",
"binary_name": "linux-modules-4.4.0-1100-kvm"
},
{
"binary_version": "4.4.0-1100.109",
"binary_name": "linux-tools-4.4.0-1100-kvm"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}
{
"ecosystem": "Ubuntu:Pro:16.04:LTS",
"cves": [
{
"id": "CVE-2020-26147",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2020-26558",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-0129",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-3483",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-3564",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-3612",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-3679",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2021-28972",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-33034",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2021-34693",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2021-38204",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2021-42008",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2021-45485",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}