USN-3753-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu 14.04 LTS.
It was discovered that the generic SCSI driver in the Linux kernel did not properly enforce permissions on kernel memory access. A local attacker could use this to expose sensitive information or possibly elevate privileges. (CVE-2017-13168)
Wen Xu discovered that a use-after-free vulnerability existed in the ext4 filesystem implementation in the Linux kernel. An attacker could use this to construct a malicious ext4 image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-10876, CVE-2018-10879)
Wen Xu discovered that a buffer overflow existed in the ext4 filesystem implementation in the Linux kernel. An attacker could use this to construct a malicious ext4 image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-10877)
Wen Xu discovered that an out-of-bounds write vulnerability existed in the ext4 filesystem implementation in the Linux kernel. An attacker could use this to construct a malicious ext4 image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-10878, CVE-2018-10882)
Wen Xu discovered that the ext4 filesystem implementation in the Linux kernel did not properly keep meta-data information consistent in some situations. An attacker could use this to construct a malicious ext4 image that, when mounted, could cause a denial of service (system crash). (CVE-2018-10881)
Shankara Pailoor discovered that the JFS filesystem implementation in the Linux kernel contained a buffer overflow when handling extended attributes. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-12233)
Wen Xu discovered that the XFS filesystem implementation in the Linux kernel did not properly handle an error condition with a corrupted xfs image. An attacker could use this to construct a malicious xfs image that, when mounted, could cause a denial of service (system crash). (CVE-2018-13094)
It was discovered that the Linux kernel did not properly handle setgid file creation when performed by a non-member of the group. A local attacker could use this to gain elevated privileges. (CVE-2018-13405)
Silvio Cesare discovered that the generic VESA frame buffer driver in the Linux kernel contained an integer overflow. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-13406)
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "4.4.0-1028.31",
"binary_name": "linux-aws-cloud-tools-4.4.0-1028"
},
{
"binary_version": "4.4.0-1028.31",
"binary_name": "linux-aws-headers-4.4.0-1028"
},
{
"binary_version": "4.4.0-1028.31",
"binary_name": "linux-aws-tools-4.4.0-1028"
},
{
"binary_version": "4.4.0-1028.31",
"binary_name": "linux-cloud-tools-4.4.0-1028-aws"
},
{
"binary_version": "4.4.0-1028.31",
"binary_name": "linux-headers-4.4.0-1028-aws"
},
{
"binary_version": "4.4.0-1028.31",
"binary_name": "linux-image-4.4.0-1028-aws"
},
{
"binary_version": "4.4.0-1028.31",
"binary_name": "linux-tools-4.4.0-1028-aws"
}
]
}
{
"ecosystem": "Ubuntu:14.04:LTS",
"cves": [
{
"id": "CVE-2017-13168",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2018-10876",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2018-10877",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2018-10878",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2018-10879",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2018-10881",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2018-10882",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2018-12233",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2018-13094",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2018-13405",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2018-13406",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "block-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "block-modules-4.4.0-134-generic-lpae-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "block-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "block-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "block-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "crypto-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "crypto-modules-4.4.0-134-generic-lpae-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "crypto-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "crypto-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "crypto-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "fat-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "fat-modules-4.4.0-134-generic-lpae-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "fat-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "fat-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "fat-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "fb-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "firewire-core-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "firewire-core-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "firewire-core-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "firewire-core-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "floppy-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "floppy-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "floppy-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "floppy-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "fs-core-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "fs-core-modules-4.4.0-134-generic-lpae-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "fs-core-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "fs-core-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "fs-core-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "fs-secondary-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "fs-secondary-modules-4.4.0-134-generic-lpae-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "fs-secondary-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "fs-secondary-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "fs-secondary-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "input-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "input-modules-4.4.0-134-generic-lpae-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "input-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "input-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "input-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "ipmi-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "ipmi-modules-4.4.0-134-generic-lpae-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "ipmi-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "ipmi-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "ipmi-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "irda-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "irda-modules-4.4.0-134-generic-lpae-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "irda-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "irda-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "irda-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "kernel-image-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "kernel-image-4.4.0-134-generic-lpae-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "kernel-image-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "kernel-image-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "kernel-image-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-cloud-tools-4.4.0-134-generic"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-cloud-tools-4.4.0-134-lowlatency"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-headers-4.4.0-134"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-headers-4.4.0-134-generic"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-headers-4.4.0-134-generic-lpae"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-headers-4.4.0-134-lowlatency"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-headers-4.4.0-134-powerpc-e500mc"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-headers-4.4.0-134-powerpc-smp"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-headers-4.4.0-134-powerpc64-emb"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-headers-4.4.0-134-powerpc64-smp"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-image-4.4.0-134-generic"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-image-4.4.0-134-generic-lpae"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-image-4.4.0-134-lowlatency"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-image-4.4.0-134-powerpc-e500mc"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-image-4.4.0-134-powerpc-smp"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-image-4.4.0-134-powerpc64-emb"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-image-4.4.0-134-powerpc64-smp"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-image-extra-4.4.0-134-generic"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-lts-xenial-cloud-tools-4.4.0-134"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-lts-xenial-tools-4.4.0-134"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-lts-xenial-udebs-generic"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-lts-xenial-udebs-generic-lpae"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-lts-xenial-udebs-powerpc-e500mc"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-lts-xenial-udebs-powerpc-smp"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-lts-xenial-udebs-powerpc64-smp"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-tools-4.4.0-134-generic"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-tools-4.4.0-134-generic-lpae"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-tools-4.4.0-134-lowlatency"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-tools-4.4.0-134-powerpc-e500mc"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-tools-4.4.0-134-powerpc-smp"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-tools-4.4.0-134-powerpc64-emb"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "linux-tools-4.4.0-134-powerpc64-smp"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "md-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "md-modules-4.4.0-134-generic-lpae-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "md-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "md-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "md-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "message-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "message-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "message-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "message-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "mouse-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "mouse-modules-4.4.0-134-generic-lpae-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "mouse-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "mouse-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "mouse-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "multipath-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "multipath-modules-4.4.0-134-generic-lpae-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "multipath-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "multipath-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "multipath-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "nfs-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "nfs-modules-4.4.0-134-generic-lpae-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "nfs-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "nfs-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "nfs-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "nic-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "nic-modules-4.4.0-134-generic-lpae-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "nic-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "nic-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "nic-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "nic-pcmcia-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "nic-shared-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "nic-shared-modules-4.4.0-134-generic-lpae-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "nic-shared-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "nic-shared-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "nic-shared-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "nic-usb-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "nic-usb-modules-4.4.0-134-generic-lpae-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "nic-usb-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "nic-usb-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "nic-usb-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "parport-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "parport-modules-4.4.0-134-generic-lpae-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "parport-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "parport-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "parport-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "pata-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "pata-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "pata-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "pata-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "pcmcia-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "pcmcia-storage-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "plip-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "plip-modules-4.4.0-134-generic-lpae-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "plip-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "plip-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "plip-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "ppp-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "ppp-modules-4.4.0-134-generic-lpae-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "ppp-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "ppp-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "ppp-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "sata-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "sata-modules-4.4.0-134-generic-lpae-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "sata-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "sata-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "sata-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "scsi-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "scsi-modules-4.4.0-134-generic-lpae-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "scsi-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "scsi-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "scsi-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "serial-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "speakup-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "speakup-modules-4.4.0-134-generic-lpae-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "speakup-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "speakup-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "speakup-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "storage-core-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "storage-core-modules-4.4.0-134-generic-lpae-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "storage-core-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "storage-core-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "storage-core-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "usb-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "usb-modules-4.4.0-134-generic-lpae-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "usb-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "usb-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "usb-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "virtio-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "virtio-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "virtio-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "virtio-modules-4.4.0-134-powerpc64-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "vlan-modules-4.4.0-134-generic-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "vlan-modules-4.4.0-134-generic-lpae-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "vlan-modules-4.4.0-134-powerpc-e500mc-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "vlan-modules-4.4.0-134-powerpc-smp-di"
},
{
"binary_version": "4.4.0-134.160~14.04.1",
"binary_name": "vlan-modules-4.4.0-134-powerpc64-smp-di"
}
]
}
{
"ecosystem": "Ubuntu:14.04:LTS",
"cves": [
{
"id": "CVE-2017-13168",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2018-10876",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2018-10877",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2018-10878",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2018-10879",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2018-10881",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2018-10882",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2018-12233",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2018-13094",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
},
{
"type": "Ubuntu",
"score": "low"
}
]
},
{
"id": "CVE-2018-13405",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
},
{
"id": "CVE-2018-13406",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "CVSS_V3",
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
},
{
"type": "Ubuntu",
"score": "medium"
}
]
}
]
}