Jann Horn discovered that the Berkeley Packet Filter (BPF) implementation in the Linux kernel improperly performed sign extension in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-16995)
It was discovered that a race condition leading to a use-after-free vulnerability existed in the ALSA PCM subsystem of the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-0861)
It was discovered that the KVM implementation in the Linux kernel allowed passthrough of the diagnostic I/O port 0x80. An attacker in a guest VM could use this to cause a denial of service (system crash) in the host OS. (CVE-2017-1000407)
It was discovered that an information disclosure vulnerability existed in the ACPI implementation of the Linux kernel. A local attacker could use this to expose sensitive information (kernel memory addresses). (CVE-2017-11472)
It was discovered that a use-after-free vulnerability existed in the network namespaces implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-15129)
It was discovered that the Advanced Linux Sound Architecture (ALSA) subsystem in the Linux kernel contained a use-after-free when handling device removal. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-16528)
Andrey Konovalov discovered that the usbtest device driver in the Linux kernel did not properly validate endpoint metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16532)
Andrey Konovalov discovered that the Conexant cx231xx USB video capture driver in the Linux kernel did not properly validate interface descriptors. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16536)
Andrey Konovalov discovered that the SoundGraph iMON USB driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16537)
Andrey Konovalov discovered that the IMS Passenger Control Unit USB driver in the Linux kernel did not properly validate device descriptors. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16645)
Andrey Konovalov discovered that the DiBcom DiB0700 USB DVB driver in the Linux kernel did not properly handle detach events. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16646)
Andrey Konovalov discovered that the CDC USB Ethernet driver did not properly validate device descriptors. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16649)
Andrey Konovalov discovered that the QMI WWAN USB driver did not properly validate device descriptors. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16650)
It was discovered that the USB Virtual Host Controller Interface (VHCI) driver in the Linux kernel contained an information disclosure vulnerability. A physically proximate attacker could use this to expose sensitive information (kernel memory). (CVE-2017-16911)
It was discovered that the USB over IP implementation in the Linux kernel did not validate endpoint numbers. A remote attacker could use this to cause a denial of service (system crash). (CVE-2017-16912)
It was discovered that the USB over IP implementation in the Linux kernel did not properly validate CMD_SUBMIT packets. A remote attacker could use this to cause a denial of service (excessive memory consumption). (CVE-2017-16913)
It was discovered that the USB over IP implementation in the Linux kernel contained a NULL pointer dereference error. A remote attacker could use this to cause a denial of service (system crash). (CVE-2017-16914)
It was discovered that the HugeTLB component of the Linux kernel did not properly handle holes in hugetlb ranges. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2017-16994)
It was discovered that the netfilter component of the Linux did not properly restrict access to the connection tracking helpers list. A local attacker could use this to bypass intended access restrictions. (CVE-2017-17448)
It was discovered that the netlink subsystem in the Linux kernel did not properly restrict observations of netlink messages to the appropriate net namespace. A local attacker could use this to expose sensitive information (kernel netlink traffic). (CVE-2017-17449)
It was discovered that the netfilter passive OS fingerprinting (xt_osf) module did not properly perform access control checks. A local attacker could improperly modify the system-wide OS fingerprint list. (CVE-2017-17450)
It was discovered that the core USB subsystem in the Linux kernel did not validate the number of configurations and interfaces in a device. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-17558)
Dmitry Vyukov discovered that the KVM implementation in the Linux kernel contained an out-of-bounds read when handling memory-mapped I/O. A local attacker could use this to expose sensitive information. (CVE-2017-17741)
It was discovered that the Salsa20 encryption algorithm implementations in the Linux kernel did not properly handle zero-length inputs. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-17805)
It was discovered that the HMAC implementation did not validate the state of the underlying cryptographic hash algorithm. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-17806)
It was discovered that the keyring implementation in the Linux kernel did not properly check permissions when a key request was performed on a task's default keyring. A local attacker could use this to add keys to unauthorized keyrings. (CVE-2017-17807)
Alexei Starovoitov discovered that the Berkeley Packet Filter (BPF) implementation in the Linux kernel contained a branch-pruning logic issue around unreachable code. A local attacker could use this to cause a denial of service. (CVE-2017-17862)
It was discovered that the parallel cryptography component of the Linux kernel incorrectly freed kernel memory. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-18075)
It was discovered that a race condition existed in the Device Mapper component of the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-18203)
It was discovered that a race condition existed in the OCFS2 file system implementation in the Linux kernel. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2017-18204)
It was discovered that an infinite loop could occur in the madvise(2) implementation in the Linux kernel in certain circumstances. A local attacker could use this to cause a denial of service (system hang). (CVE-2017-18208)
Andy Lutomirski discovered that the KVM implementation in the Linux kernel was vulnerable to a debug exception error when single-stepping through a syscall. A local attacker in a non-Linux guest vm could possibly use this to gain administrative privileges in the guest vm. (CVE-2017-7518)
It was discovered that the Broadcom NetXtremeII ethernet driver in the Linux kernel did not properly validate Generic Segment Offload (GSO) packet sizes. An attacker could use this to cause a denial of service (interface unavailability). (CVE-2018-1000026)
It was discovered that the Reliable Datagram Socket (RDS) implementation in the Linux kernel contained an out-of-bounds write during RDMA page allocation. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-5332)
Mohamed Ghannam discovered a null pointer dereference in the RDS (Reliable Datagram Sockets) protocol implementation of the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-5333)
范龙飞 discovered that a race condition existed in loop block device implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-5344)
It was discovered that an integer overflow error existed in the futex implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-6927)
It was discovered that a NULL pointer dereference existed in the RDS (Reliable Datagram Sockets) protocol implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-7492)
It was discovered that the Broadcom UniMAC MDIO bus controller driver in the Linux kernel did not properly validate device resources. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-8043)
{ "availability": "No subscription required", "binaries": [ { "nic-shared-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "ipmi-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "md-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "fs-core-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "linux-source-4.4.0": "4.4.0-119.143", "linux-image-4.4.0-119-generic-lpae": "4.4.0-119.143", "block-modules-4.4.0-119-generic-di": "4.4.0-119.143", "linux-tools-4.4.0-119": "4.4.0-119.143", "block-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "nic-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "nic-usb-modules-4.4.0-119-generic-lpae-di": "4.4.0-119.143", "crypto-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "input-modules-4.4.0-119-generic-lpae-di": "4.4.0-119.143", "linux-image-4.4.0-119-powerpc-smp": "4.4.0-119.143", "speakup-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "nfs-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "floppy-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "nic-usb-modules-4.4.0-119-generic-di": "4.4.0-119.143", "storage-core-modules-4.4.0-119-generic-lpae-di": "4.4.0-119.143", "sata-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "kernel-image-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "speakup-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "linux-headers-4.4.0-119-lowlatency": "4.4.0-119.143", "fs-core-modules-4.4.0-119-generic-di": "4.4.0-119.143", "storage-core-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "block-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "md-modules-4.4.0-119-generic-lpae-di": "4.4.0-119.143", "message-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "nfs-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "fs-secondary-modules-4.4.0-119-generic-lpae-di": "4.4.0-119.143", "kernel-image-4.4.0-119-generic-di": "4.4.0-119.143", "floppy-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "nic-usb-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "input-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "fs-core-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "nic-shared-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "linux-image-4.4.0-119-generic-dbgsym": "4.4.0-119.143", "sata-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "mouse-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "linux-headers-4.4.0-119-powerpc-e500mc": "4.4.0-119.143", "vlan-modules-4.4.0-119-generic-lpae-di": "4.4.0-119.143", "linux-cloud-tools-4.4.0-119": "4.4.0-119.143", "input-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "ppp-modules-4.4.0-119-generic-di": "4.4.0-119.143", "linux-image-4.4.0-119-generic": "4.4.0-119.143", "firewire-core-modules-4.4.0-119-generic-di": "4.4.0-119.143", "linux-image-4.4.0-119-powerpc64-smp": "4.4.0-119.143", "scsi-modules-4.4.0-119-generic-di": "4.4.0-119.143", "fat-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "linux-libc-dev": "4.4.0-119.143", "linux-cloud-tools-common": "4.4.0-119.143", "linux-tools-4.4.0-119-dbgsym": "4.4.0-119.143", "linux-tools-4.4.0-119-powerpc-smp": "4.4.0-119.143", "multipath-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "nic-pcmcia-modules-4.4.0-119-generic-di": "4.4.0-119.143", "fs-secondary-modules-4.4.0-119-generic-di": "4.4.0-119.143", "kernel-image-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "nic-modules-4.4.0-119-generic-di": "4.4.0-119.143", "fs-secondary-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "nic-usb-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "nic-modules-4.4.0-119-generic-lpae-di": "4.4.0-119.143", "kernel-image-4.4.0-119-generic-lpae-di": "4.4.0-119.143", "firewire-core-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "linux-tools-4.4.0-119-powerpc-e500mc": "4.4.0-119.143", "linux-headers-4.4.0-119-powerpc64-smp": "4.4.0-119.143", "crypto-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "crypto-modules-4.4.0-119-generic-lpae-di": "4.4.0-119.143", "linux-udebs-powerpc-smp": "4.4.0-119.143", "mouse-modules-4.4.0-119-generic-lpae-di": "4.4.0-119.143", "storage-core-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "parport-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "parport-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "linux-cloud-tools-4.4.0-119-generic": "4.4.0-119.143", "linux-tools-4.4.0-119-powerpc64-smp": "4.4.0-119.143", "nic-shared-modules-4.4.0-119-generic-di": "4.4.0-119.143", "fs-core-modules-4.4.0-119-generic-lpae-di": "4.4.0-119.143", "fs-secondary-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "ipmi-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "plip-modules-4.4.0-119-generic-di": "4.4.0-119.143", "ppp-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "crypto-modules-4.4.0-119-generic-di": "4.4.0-119.143", "floppy-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "linux-tools-common": "4.4.0-119.143", "linux-headers-4.4.0-119": "4.4.0-119.143", "usb-modules-4.4.0-119-generic-di": "4.4.0-119.143", "sata-modules-4.4.0-119-generic-lpae-di": "4.4.0-119.143", "ppp-modules-4.4.0-119-generic-lpae-di": "4.4.0-119.143", "virtio-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "virtio-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "pata-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "usb-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "linux-headers-4.4.0-119-powerpc-smp": "4.4.0-119.143", "md-modules-4.4.0-119-generic-di": "4.4.0-119.143", "dasd-modules-4.4.0-119-generic-di": "4.4.0-119.143", "linux-image-4.4.0-119-powerpc-e500mc": "4.4.0-119.143", "nic-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "floppy-modules-4.4.0-119-generic-di": "4.4.0-119.143", "fat-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "plip-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "linux-image-4.4.0-119-lowlatency": "4.4.0-119.143", "linux-udebs-generic": "4.4.0-119.143", "mouse-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "storage-core-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "fat-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "scsi-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "multipath-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "ppp-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "scsi-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "virtio-modules-4.4.0-119-generic-di": "4.4.0-119.143", "linux-udebs-powerpc-e500mc": "4.4.0-119.143", "mouse-modules-4.4.0-119-generic-di": "4.4.0-119.143", "fs-core-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "input-modules-4.4.0-119-generic-di": "4.4.0-119.143", "nic-usb-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "nfs-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "linux-image-4.4.0-119-generic-lpae-dbgsym": "4.4.0-119.143", "linux-cloud-tools-4.4.0-119-lowlatency": "4.4.0-119.143", "scsi-modules-4.4.0-119-generic-lpae-di": "4.4.0-119.143", "pcmcia-storage-modules-4.4.0-119-generic-di": "4.4.0-119.143", "linux-udebs-powerpc64-smp": "4.4.0-119.143", "vlan-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "irda-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "ipmi-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "speakup-modules-4.4.0-119-generic-di": "4.4.0-119.143", "parport-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "dasd-extra-modules-4.4.0-119-generic-di": "4.4.0-119.143", "mouse-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "vlan-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "usb-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "parport-modules-4.4.0-119-generic-lpae-di": "4.4.0-119.143", "virtio-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "irda-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "fat-modules-4.4.0-119-generic-lpae-di": "4.4.0-119.143", "multipath-modules-4.4.0-119-generic-di": "4.4.0-119.143", "linux-image-4.4.0-119-powerpc64-smp-dbgsym": "4.4.0-119.143", "pata-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "message-modules-4.4.0-119-generic-di": "4.4.0-119.143", "plip-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "nic-shared-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "plip-modules-4.4.0-119-generic-lpae-di": "4.4.0-119.143", "usb-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "vlan-modules-4.4.0-119-generic-di": "4.4.0-119.143", "scsi-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "irda-modules-4.4.0-119-generic-di": "4.4.0-119.143", "linux-image-4.4.0-119-powerpc-smp-dbgsym": "4.4.0-119.143", "serial-modules-4.4.0-119-generic-di": "4.4.0-119.143", "linux-tools-4.4.0-119-generic-lpae": "4.4.0-119.143", "block-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "nfs-modules-4.4.0-119-generic-lpae-di": "4.4.0-119.143", "speakup-modules-4.4.0-119-generic-lpae-di": "4.4.0-119.143", "md-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "fs-secondary-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "linux-tools-4.4.0-119-powerpc64-emb": "4.4.0-119.143", "speakup-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "linux-doc": "4.4.0-119.143", "ipmi-modules-4.4.0-119-generic-lpae-di": "4.4.0-119.143", "linux-headers-4.4.0-119-powerpc64-emb": "4.4.0-119.143", "nic-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "parport-modules-4.4.0-119-generic-di": "4.4.0-119.143", "usb-modules-4.4.0-119-generic-lpae-di": "4.4.0-119.143", "irda-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "input-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "linux-image-4.4.0-119-powerpc64-emb-dbgsym": "4.4.0-119.143", "linux-image-extra-4.4.0-119-generic": "4.4.0-119.143", "linux-image-4.4.0-119-powerpc64-emb": "4.4.0-119.143", "block-modules-4.4.0-119-generic-lpae-di": "4.4.0-119.143", "linux-tools-4.4.0-119-lowlatency": "4.4.0-119.143", "linux-headers-4.4.0-119-generic-lpae": "4.4.0-119.143", "md-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "vlan-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "pcmcia-modules-4.4.0-119-generic-di": "4.4.0-119.143", "ipmi-modules-4.4.0-119-generic-di": "4.4.0-119.143", "plip-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "message-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "linux-tools-4.4.0-119-generic": "4.4.0-119.143", "fb-modules-4.4.0-119-generic-di": "4.4.0-119.143", "message-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "linux-image-4.4.0-119-powerpc-e500mc-dbgsym": "4.4.0-119.143", "linux-udebs-generic-lpae": "4.4.0-119.143", "nic-shared-modules-4.4.0-119-generic-lpae-di": "4.4.0-119.143", "pata-modules-4.4.0-119-generic-di": "4.4.0-119.143", "linux-cloud-tools-4.4.0-119-dbgsym": "4.4.0-119.143", "nfs-modules-4.4.0-119-generic-di": "4.4.0-119.143", "storage-core-modules-4.4.0-119-generic-di": "4.4.0-119.143", "ppp-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "firewire-core-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143", "firewire-core-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "linux-headers-4.4.0-119-generic": "4.4.0-119.143", "kernel-image-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "linux-image-4.4.0-119-lowlatency-dbgsym": "4.4.0-119.143", "crypto-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "pata-modules-4.4.0-119-powerpc-smp-di": "4.4.0-119.143", "fat-modules-4.4.0-119-generic-di": "4.4.0-119.143", "multipath-modules-4.4.0-119-generic-lpae-di": "4.4.0-119.143", "irda-modules-4.4.0-119-generic-lpae-di": "4.4.0-119.143", "sata-modules-4.4.0-119-generic-di": "4.4.0-119.143", "sata-modules-4.4.0-119-powerpc64-smp-di": "4.4.0-119.143", "multipath-modules-4.4.0-119-powerpc-e500mc-di": "4.4.0-119.143" } ] }
{ "availability": "No subscription required", "binaries": [ { "linux-cloud-tools-4.4.0-1054-aws": "4.4.0-1054.63", "linux-aws-cloud-tools-4.4.0-1054-dbgsym": "4.4.0-1054.63", "linux-image-4.4.0-1054-aws": "4.4.0-1054.63", "linux-aws-tools-4.4.0-1054-dbgsym": "4.4.0-1054.63", "linux-aws-cloud-tools-4.4.0-1054": "4.4.0-1054.63", "linux-aws-headers-4.4.0-1054": "4.4.0-1054.63", "linux-aws-tools-4.4.0-1054": "4.4.0-1054.63", "linux-headers-4.4.0-1054-aws": "4.4.0-1054.63", "linux-tools-4.4.0-1054-aws": "4.4.0-1054.63", "linux-image-4.4.0-1054-aws-dbgsym": "4.4.0-1054.63" } ] }
{ "availability": "No subscription required", "binaries": [ { "linux-image-4.4.0-1020-kvm": "4.4.0-1020.25", "linux-kvm-cloud-tools-4.4.0-1020-dbgsym": "4.4.0-1020.25", "linux-kvm-cloud-tools-4.4.0-1020": "4.4.0-1020.25", "linux-cloud-tools-4.4.0-1020-kvm": "4.4.0-1020.25", "linux-kvm-headers-4.4.0-1020": "4.4.0-1020.25", "linux-tools-4.4.0-1020-kvm": "4.4.0-1020.25", "linux-headers-4.4.0-1020-kvm": "4.4.0-1020.25", "linux-image-4.4.0-1020-kvm-dbgsym": "4.4.0-1020.25", "linux-kvm-tools-4.4.0-1020-dbgsym": "4.4.0-1020.25", "linux-kvm-tools-4.4.0-1020": "4.4.0-1020.25" } ] }
{ "availability": "No subscription required", "binaries": [ { "linux-raspi2-tools-4.4.0-1086-dbgsym": "4.4.0-1086.94", "linux-image-4.4.0-1086-raspi2-dbgsym": "4.4.0-1086.94", "linux-raspi2-headers-4.4.0-1086": "4.4.0-1086.94", "linux-headers-4.4.0-1086-raspi2": "4.4.0-1086.94", "linux-raspi2-tools-4.4.0-1086": "4.4.0-1086.94", "linux-image-4.4.0-1086-raspi2": "4.4.0-1086.94", "linux-tools-4.4.0-1086-raspi2": "4.4.0-1086.94" } ] }
{ "availability": "No subscription required", "binaries": [ { "linux-snapdragon-tools-4.4.0-1088": "4.4.0-1088.93", "linux-image-4.4.0-1088-snapdragon": "4.4.0-1088.93", "linux-tools-4.4.0-1088-snapdragon": "4.4.0-1088.93", "linux-snapdragon-tools-4.4.0-1088-dbgsym": "4.4.0-1088.93", "linux-image-4.4.0-1088-snapdragon-dbgsym": "4.4.0-1088.93", "linux-headers-4.4.0-1088-snapdragon": "4.4.0-1088.93", "linux-snapdragon-headers-4.4.0-1088": "4.4.0-1088.93" } ] }