USN-3619-1

Source
https://ubuntu.com/security/notices/USN-3619-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3619-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-3619-1
Related
Published
2018-04-04T19:21:17.560003Z
Modified
2018-04-04T19:21:17.560003Z
Summary
linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities
Details

Jann Horn discovered that the Berkeley Packet Filter (BPF) implementation in the Linux kernel improperly performed sign extension in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-16995)

It was discovered that a race condition leading to a use-after-free vulnerability existed in the ALSA PCM subsystem of the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-0861)

It was discovered that the KVM implementation in the Linux kernel allowed passthrough of the diagnostic I/O port 0x80. An attacker in a guest VM could use this to cause a denial of service (system crash) in the host OS. (CVE-2017-1000407)

It was discovered that an information disclosure vulnerability existed in the ACPI implementation of the Linux kernel. A local attacker could use this to expose sensitive information (kernel memory addresses). (CVE-2017-11472)

It was discovered that a use-after-free vulnerability existed in the network namespaces implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-15129)

It was discovered that the Advanced Linux Sound Architecture (ALSA) subsystem in the Linux kernel contained a use-after-free when handling device removal. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-16528)

Andrey Konovalov discovered that the usbtest device driver in the Linux kernel did not properly validate endpoint metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16532)

Andrey Konovalov discovered that the Conexant cx231xx USB video capture driver in the Linux kernel did not properly validate interface descriptors. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16536)

Andrey Konovalov discovered that the SoundGraph iMON USB driver in the Linux kernel did not properly validate device metadata. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16537)

Andrey Konovalov discovered that the IMS Passenger Control Unit USB driver in the Linux kernel did not properly validate device descriptors. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16645)

Andrey Konovalov discovered that the DiBcom DiB0700 USB DVB driver in the Linux kernel did not properly handle detach events. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16646)

Andrey Konovalov discovered that the CDC USB Ethernet driver did not properly validate device descriptors. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16649)

Andrey Konovalov discovered that the QMI WWAN USB driver did not properly validate device descriptors. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16650)

It was discovered that the USB Virtual Host Controller Interface (VHCI) driver in the Linux kernel contained an information disclosure vulnerability. A physically proximate attacker could use this to expose sensitive information (kernel memory). (CVE-2017-16911)

It was discovered that the USB over IP implementation in the Linux kernel did not validate endpoint numbers. A remote attacker could use this to cause a denial of service (system crash). (CVE-2017-16912)

It was discovered that the USB over IP implementation in the Linux kernel did not properly validate CMD_SUBMIT packets. A remote attacker could use this to cause a denial of service (excessive memory consumption). (CVE-2017-16913)

It was discovered that the USB over IP implementation in the Linux kernel contained a NULL pointer dereference error. A remote attacker could use this to cause a denial of service (system crash). (CVE-2017-16914)

It was discovered that the HugeTLB component of the Linux kernel did not properly handle holes in hugetlb ranges. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2017-16994)

It was discovered that the netfilter component of the Linux did not properly restrict access to the connection tracking helpers list. A local attacker could use this to bypass intended access restrictions. (CVE-2017-17448)

It was discovered that the netlink subsystem in the Linux kernel did not properly restrict observations of netlink messages to the appropriate net namespace. A local attacker could use this to expose sensitive information (kernel netlink traffic). (CVE-2017-17449)

It was discovered that the netfilter passive OS fingerprinting (xt_osf) module did not properly perform access control checks. A local attacker could improperly modify the system-wide OS fingerprint list. (CVE-2017-17450)

It was discovered that the core USB subsystem in the Linux kernel did not validate the number of configurations and interfaces in a device. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-17558)

Dmitry Vyukov discovered that the KVM implementation in the Linux kernel contained an out-of-bounds read when handling memory-mapped I/O. A local attacker could use this to expose sensitive information. (CVE-2017-17741)

It was discovered that the Salsa20 encryption algorithm implementations in the Linux kernel did not properly handle zero-length inputs. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-17805)

It was discovered that the HMAC implementation did not validate the state of the underlying cryptographic hash algorithm. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-17806)

It was discovered that the keyring implementation in the Linux kernel did not properly check permissions when a key request was performed on a task's default keyring. A local attacker could use this to add keys to unauthorized keyrings. (CVE-2017-17807)

Alexei Starovoitov discovered that the Berkeley Packet Filter (BPF) implementation in the Linux kernel contained a branch-pruning logic issue around unreachable code. A local attacker could use this to cause a denial of service. (CVE-2017-17862)

It was discovered that the parallel cryptography component of the Linux kernel incorrectly freed kernel memory. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-18075)

It was discovered that a race condition existed in the Device Mapper component of the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-18203)

It was discovered that a race condition existed in the OCFS2 file system implementation in the Linux kernel. A local attacker could use this to cause a denial of service (kernel deadlock). (CVE-2017-18204)

It was discovered that an infinite loop could occur in the madvise(2) implementation in the Linux kernel in certain circumstances. A local attacker could use this to cause a denial of service (system hang). (CVE-2017-18208)

Andy Lutomirski discovered that the KVM implementation in the Linux kernel was vulnerable to a debug exception error when single-stepping through a syscall. A local attacker in a non-Linux guest vm could possibly use this to gain administrative privileges in the guest vm. (CVE-2017-7518)

It was discovered that the Broadcom NetXtremeII ethernet driver in the Linux kernel did not properly validate Generic Segment Offload (GSO) packet sizes. An attacker could use this to cause a denial of service (interface unavailability). (CVE-2018-1000026)

It was discovered that the Reliable Datagram Socket (RDS) implementation in the Linux kernel contained an out-of-bounds write during RDMA page allocation. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-5332)

Mohamed Ghannam discovered a null pointer dereference in the RDS (Reliable Datagram Sockets) protocol implementation of the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-5333)

范龙飞 discovered that a race condition existed in loop block device implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-5344)

It was discovered that an integer overflow error existed in the futex implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-6927)

It was discovered that a NULL pointer dereference existed in the RDS (Reliable Datagram Sockets) protocol implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-7492)

It was discovered that the Broadcom UniMAC MDIO bus controller driver in the Linux kernel did not properly validate device resources. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-8043)

References

Affected packages

Ubuntu:16.04:LTS / linux

Package

Name
linux
Purl
pkg:deb/ubuntu/linux?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.0-119.143

Affected versions

4.*

4.2.0-16.19
4.2.0-17.21
4.2.0-19.23
4.3.0-1.10
4.3.0-2.11
4.3.0-5.16
4.3.0-6.17
4.3.0-7.18
4.4.0-2.16
4.4.0-4.19
4.4.0-6.21
4.4.0-7.22
4.4.0-8.23
4.4.0-9.24
4.4.0-10.25
4.4.0-11.26
4.4.0-12.28
4.4.0-13.29
4.4.0-14.30
4.4.0-15.31
4.4.0-16.32
4.4.0-17.33
4.4.0-18.34
4.4.0-21.37
4.4.0-22.39
4.4.0-22.40
4.4.0-24.43
4.4.0-28.47
4.4.0-31.50
4.4.0-34.53
4.4.0-36.55
4.4.0-38.57
4.4.0-42.62
4.4.0-43.63
4.4.0-45.66
4.4.0-47.68
4.4.0-51.72
4.4.0-53.74
4.4.0-57.78
4.4.0-59.80
4.4.0-62.83
4.4.0-63.84
4.4.0-64.85
4.4.0-65.86
4.4.0-66.87
4.4.0-67.88
4.4.0-70.91
4.4.0-71.92
4.4.0-72.93
4.4.0-75.96
4.4.0-77.98
4.4.0-78.99
4.4.0-79.100
4.4.0-81.104
4.4.0-83.106
4.4.0-87.110
4.4.0-89.112
4.4.0-91.114
4.4.0-92.115
4.4.0-93.116
4.4.0-96.119
4.4.0-97.120
4.4.0-98.121
4.4.0-101.124
4.4.0-103.126
4.4.0-104.127
4.4.0-108.131
4.4.0-109.132
4.4.0-112.135
4.4.0-116.140

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "block-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "block-modules-4.4.0-119-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "block-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "block-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "block-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "crypto-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "crypto-modules-4.4.0-119-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "crypto-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "crypto-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "crypto-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "dasd-extra-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "dasd-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "fat-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "fat-modules-4.4.0-119-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "fat-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "fat-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "fat-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "fb-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "firewire-core-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "firewire-core-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "firewire-core-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "firewire-core-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "floppy-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "floppy-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "floppy-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "floppy-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "fs-core-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "fs-core-modules-4.4.0-119-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "fs-core-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "fs-core-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "fs-core-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "fs-secondary-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "fs-secondary-modules-4.4.0-119-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "fs-secondary-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "fs-secondary-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "fs-secondary-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "input-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "input-modules-4.4.0-119-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "input-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "input-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "input-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "ipmi-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "ipmi-modules-4.4.0-119-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "ipmi-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "ipmi-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "ipmi-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "irda-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "irda-modules-4.4.0-119-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "irda-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "irda-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "irda-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "kernel-image-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "kernel-image-4.4.0-119-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "kernel-image-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "kernel-image-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "kernel-image-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-cloud-tools-4.4.0-119"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-cloud-tools-4.4.0-119-dbgsym"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-cloud-tools-4.4.0-119-generic"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-cloud-tools-4.4.0-119-lowlatency"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-cloud-tools-common"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-doc"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-headers-4.4.0-119"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-headers-4.4.0-119-generic"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-headers-4.4.0-119-generic-lpae"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-headers-4.4.0-119-lowlatency"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-headers-4.4.0-119-powerpc-e500mc"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-headers-4.4.0-119-powerpc-smp"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-headers-4.4.0-119-powerpc64-emb"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-headers-4.4.0-119-powerpc64-smp"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-image-4.4.0-119-generic"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-image-4.4.0-119-generic-dbgsym"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-image-4.4.0-119-generic-lpae"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-image-4.4.0-119-generic-lpae-dbgsym"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-image-4.4.0-119-lowlatency"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-image-4.4.0-119-lowlatency-dbgsym"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-image-4.4.0-119-powerpc-e500mc"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-image-4.4.0-119-powerpc-e500mc-dbgsym"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-image-4.4.0-119-powerpc-smp"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-image-4.4.0-119-powerpc-smp-dbgsym"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-image-4.4.0-119-powerpc64-emb"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-image-4.4.0-119-powerpc64-emb-dbgsym"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-image-4.4.0-119-powerpc64-smp"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-image-4.4.0-119-powerpc64-smp-dbgsym"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-image-extra-4.4.0-119-generic"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-libc-dev"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-source-4.4.0"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-tools-4.4.0-119"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-tools-4.4.0-119-dbgsym"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-tools-4.4.0-119-generic"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-tools-4.4.0-119-generic-lpae"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-tools-4.4.0-119-lowlatency"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-tools-4.4.0-119-powerpc-e500mc"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-tools-4.4.0-119-powerpc-smp"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-tools-4.4.0-119-powerpc64-emb"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-tools-4.4.0-119-powerpc64-smp"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-tools-common"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-udebs-generic"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-udebs-generic-lpae"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-udebs-powerpc-e500mc"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-udebs-powerpc-smp"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "linux-udebs-powerpc64-smp"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "md-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "md-modules-4.4.0-119-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "md-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "md-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "md-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "message-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "message-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "message-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "message-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "mouse-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "mouse-modules-4.4.0-119-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "mouse-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "mouse-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "mouse-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "multipath-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "multipath-modules-4.4.0-119-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "multipath-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "multipath-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "multipath-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "nfs-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "nfs-modules-4.4.0-119-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "nfs-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "nfs-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "nfs-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "nic-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "nic-modules-4.4.0-119-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "nic-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "nic-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "nic-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "nic-pcmcia-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "nic-shared-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "nic-shared-modules-4.4.0-119-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "nic-shared-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "nic-shared-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "nic-shared-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "nic-usb-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "nic-usb-modules-4.4.0-119-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "nic-usb-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "nic-usb-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "nic-usb-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "parport-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "parport-modules-4.4.0-119-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "parport-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "parport-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "parport-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "pata-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "pata-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "pata-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "pata-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "pcmcia-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "pcmcia-storage-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "plip-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "plip-modules-4.4.0-119-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "plip-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "plip-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "plip-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "ppp-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "ppp-modules-4.4.0-119-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "ppp-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "ppp-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "ppp-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "sata-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "sata-modules-4.4.0-119-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "sata-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "sata-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "sata-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "scsi-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "scsi-modules-4.4.0-119-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "scsi-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "scsi-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "scsi-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "serial-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "speakup-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "speakup-modules-4.4.0-119-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "speakup-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "speakup-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "speakup-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "storage-core-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "storage-core-modules-4.4.0-119-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "storage-core-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "storage-core-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "storage-core-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "usb-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "usb-modules-4.4.0-119-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "usb-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "usb-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "usb-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "virtio-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "virtio-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "virtio-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "virtio-modules-4.4.0-119-powerpc64-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "vlan-modules-4.4.0-119-generic-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "vlan-modules-4.4.0-119-generic-lpae-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "vlan-modules-4.4.0-119-powerpc-e500mc-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "vlan-modules-4.4.0-119-powerpc-smp-di"
        },
        {
            "binary_version": "4.4.0-119.143",
            "binary_name": "vlan-modules-4.4.0-119-powerpc64-smp-di"
        }
    ]
}

Ubuntu:16.04:LTS / linux-aws

Package

Name
linux-aws
Purl
pkg:deb/ubuntu/linux-aws?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.0-1054.63

Affected versions

4.*

4.4.0-1001.10
4.4.0-1003.12
4.4.0-1004.13
4.4.0-1007.16
4.4.0-1009.18
4.4.0-1011.20
4.4.0-1012.21
4.4.0-1013.22
4.4.0-1016.25
4.4.0-1017.26
4.4.0-1018.27
4.4.0-1020.29
4.4.0-1022.31
4.4.0-1026.35
4.4.0-1028.37
4.4.0-1030.39
4.4.0-1031.40
4.4.0-1032.41
4.4.0-1035.44
4.4.0-1037.46
4.4.0-1038.47
4.4.0-1039.48
4.4.0-1041.50
4.4.0-1043.52
4.4.0-1044.53
4.4.0-1047.56
4.4.0-1048.57
4.4.0-1049.58
4.4.0-1050.59
4.4.0-1052.61

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "4.4.0-1054.63",
            "binary_name": "linux-aws-cloud-tools-4.4.0-1054"
        },
        {
            "binary_version": "4.4.0-1054.63",
            "binary_name": "linux-aws-cloud-tools-4.4.0-1054-dbgsym"
        },
        {
            "binary_version": "4.4.0-1054.63",
            "binary_name": "linux-aws-headers-4.4.0-1054"
        },
        {
            "binary_version": "4.4.0-1054.63",
            "binary_name": "linux-aws-tools-4.4.0-1054"
        },
        {
            "binary_version": "4.4.0-1054.63",
            "binary_name": "linux-aws-tools-4.4.0-1054-dbgsym"
        },
        {
            "binary_version": "4.4.0-1054.63",
            "binary_name": "linux-cloud-tools-4.4.0-1054-aws"
        },
        {
            "binary_version": "4.4.0-1054.63",
            "binary_name": "linux-headers-4.4.0-1054-aws"
        },
        {
            "binary_version": "4.4.0-1054.63",
            "binary_name": "linux-image-4.4.0-1054-aws"
        },
        {
            "binary_version": "4.4.0-1054.63",
            "binary_name": "linux-image-4.4.0-1054-aws-dbgsym"
        },
        {
            "binary_version": "4.4.0-1054.63",
            "binary_name": "linux-tools-4.4.0-1054-aws"
        }
    ]
}

Ubuntu:16.04:LTS / linux-kvm

Package

Name
linux-kvm
Purl
pkg:deb/ubuntu/linux-kvm?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.0-1020.25

Affected versions

4.*

4.4.0-1004.9
4.4.0-1007.12
4.4.0-1008.13
4.4.0-1009.14
4.4.0-1010.15
4.4.0-1012.17
4.4.0-1013.18
4.4.0-1015.20
4.4.0-1017.22
4.4.0-1019.24

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "4.4.0-1020.25",
            "binary_name": "linux-cloud-tools-4.4.0-1020-kvm"
        },
        {
            "binary_version": "4.4.0-1020.25",
            "binary_name": "linux-headers-4.4.0-1020-kvm"
        },
        {
            "binary_version": "4.4.0-1020.25",
            "binary_name": "linux-image-4.4.0-1020-kvm"
        },
        {
            "binary_version": "4.4.0-1020.25",
            "binary_name": "linux-image-4.4.0-1020-kvm-dbgsym"
        },
        {
            "binary_version": "4.4.0-1020.25",
            "binary_name": "linux-kvm-cloud-tools-4.4.0-1020"
        },
        {
            "binary_version": "4.4.0-1020.25",
            "binary_name": "linux-kvm-cloud-tools-4.4.0-1020-dbgsym"
        },
        {
            "binary_version": "4.4.0-1020.25",
            "binary_name": "linux-kvm-headers-4.4.0-1020"
        },
        {
            "binary_version": "4.4.0-1020.25",
            "binary_name": "linux-kvm-tools-4.4.0-1020"
        },
        {
            "binary_version": "4.4.0-1020.25",
            "binary_name": "linux-kvm-tools-4.4.0-1020-dbgsym"
        },
        {
            "binary_version": "4.4.0-1020.25",
            "binary_name": "linux-tools-4.4.0-1020-kvm"
        }
    ]
}

Ubuntu:16.04:LTS / linux-raspi2

Package

Name
linux-raspi2
Purl
pkg:deb/ubuntu/linux-raspi2?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.0-1086.94

Affected versions

4.*

4.2.0-1013.19
4.2.0-1014.21
4.3.0-1006.6
4.4.0-1003.4
4.4.0-1004.5
4.4.0-1009.10
4.4.0-1010.12
4.4.0-1010.13
4.4.0-1012.16
4.4.0-1016.22
4.4.0-1017.23
4.4.0-1019.25
4.4.0-1021.27
4.4.0-1023.29
4.4.0-1027.33
4.4.0-1029.36
4.4.0-1034.41
4.4.0-1038.45
4.4.0-1040.47
4.4.0-1042.49
4.4.0-1044.51
4.4.0-1046.53
4.4.0-1048.55
4.4.0-1050.57
4.4.0-1051.58
4.4.0-1052.59
4.4.0-1054.61
4.4.0-1055.62
4.4.0-1057.64
4.4.0-1059.67
4.4.0-1061.69
4.4.0-1065.73
4.4.0-1067.75
4.4.0-1069.77
4.4.0-1070.78
4.4.0-1071.79
4.4.0-1074.82
4.4.0-1075.83
4.4.0-1076.84
4.4.0-1077.85
4.4.0-1079.87
4.4.0-1080.88
4.4.0-1082.90
4.4.0-1085.93

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "4.4.0-1086.94",
            "binary_name": "linux-headers-4.4.0-1086-raspi2"
        },
        {
            "binary_version": "4.4.0-1086.94",
            "binary_name": "linux-image-4.4.0-1086-raspi2"
        },
        {
            "binary_version": "4.4.0-1086.94",
            "binary_name": "linux-image-4.4.0-1086-raspi2-dbgsym"
        },
        {
            "binary_version": "4.4.0-1086.94",
            "binary_name": "linux-raspi2-headers-4.4.0-1086"
        },
        {
            "binary_version": "4.4.0-1086.94",
            "binary_name": "linux-raspi2-tools-4.4.0-1086"
        },
        {
            "binary_version": "4.4.0-1086.94",
            "binary_name": "linux-raspi2-tools-4.4.0-1086-dbgsym"
        },
        {
            "binary_version": "4.4.0-1086.94",
            "binary_name": "linux-tools-4.4.0-1086-raspi2"
        }
    ]
}

Ubuntu:16.04:LTS / linux-snapdragon

Package

Name
linux-snapdragon
Purl
pkg:deb/ubuntu/linux-snapdragon?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.0-1088.93

Affected versions

4.*

4.4.0-1012.12
4.4.0-1013.14
4.4.0-1013.15
4.4.0-1015.18
4.4.0-1019.22
4.4.0-1020.23
4.4.0-1022.25
4.4.0-1024.27
4.4.0-1026.29
4.4.0-1030.33
4.4.0-1032.36
4.4.0-1035.39
4.4.0-1039.43
4.4.0-1042.46
4.4.0-1044.48
4.4.0-1046.50
4.4.0-1047.51
4.4.0-1048.52
4.4.0-1050.54
4.4.0-1051.55
4.4.0-1053.57
4.4.0-1054.58
4.4.0-1055.59
4.4.0-1057.61
4.4.0-1058.62
4.4.0-1059.63
4.4.0-1061.66
4.4.0-1063.68
4.4.0-1067.72
4.4.0-1069.74
4.4.0-1071.76
4.4.0-1072.77
4.4.0-1073.78
4.4.0-1076.81
4.4.0-1077.82
4.4.0-1078.83
4.4.0-1079.84
4.4.0-1081.86
4.4.0-1082.87
4.4.0-1084.89
4.4.0-1087.92

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "4.4.0-1088.93",
            "binary_name": "linux-headers-4.4.0-1088-snapdragon"
        },
        {
            "binary_version": "4.4.0-1088.93",
            "binary_name": "linux-image-4.4.0-1088-snapdragon"
        },
        {
            "binary_version": "4.4.0-1088.93",
            "binary_name": "linux-image-4.4.0-1088-snapdragon-dbgsym"
        },
        {
            "binary_version": "4.4.0-1088.93",
            "binary_name": "linux-snapdragon-headers-4.4.0-1088"
        },
        {
            "binary_version": "4.4.0-1088.93",
            "binary_name": "linux-snapdragon-tools-4.4.0-1088"
        },
        {
            "binary_version": "4.4.0-1088.93",
            "binary_name": "linux-snapdragon-tools-4.4.0-1088-dbgsym"
        },
        {
            "binary_version": "4.4.0-1088.93",
            "binary_name": "linux-tools-4.4.0-1088-snapdragon"
        }
    ]
}