USN-3753-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu 14.04 LTS.
It was discovered that the generic SCSI driver in the Linux kernel did not properly enforce permissions on kernel memory access. A local attacker could use this to expose sensitive information or possibly elevate privileges. (CVE-2017-13168)
Wen Xu discovered that a use-after-free vulnerability existed in the ext4 filesystem implementation in the Linux kernel. An attacker could use this to construct a malicious ext4 image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-10876, CVE-2018-10879)
Wen Xu discovered that a buffer overflow existed in the ext4 filesystem implementation in the Linux kernel. An attacker could use this to construct a malicious ext4 image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-10877)
Wen Xu discovered that an out-of-bounds write vulnerability existed in the ext4 filesystem implementation in the Linux kernel. An attacker could use this to construct a malicious ext4 image that, when mounted, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-10878, CVE-2018-10882)
Wen Xu discovered that the ext4 filesystem implementation in the Linux kernel did not properly keep meta-data information consistent in some situations. An attacker could use this to construct a malicious ext4 image that, when mounted, could cause a denial of service (system crash). (CVE-2018-10881)
Shankara Pailoor discovered that the JFS filesystem implementation in the Linux kernel contained a buffer overflow when handling extended attributes. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-12233)
Wen Xu discovered that the XFS filesystem implementation in the Linux kernel did not properly handle an error condition with a corrupted xfs image. An attacker could use this to construct a malicious xfs image that, when mounted, could cause a denial of service (system crash). (CVE-2018-13094)
It was discovered that the Linux kernel did not properly handle setgid file creation when performed by a non-member of the group. A local attacker could use this to gain elevated privileges. (CVE-2018-13405)
Silvio Cesare discovered that the generic VESA frame buffer driver in the Linux kernel contained an integer overflow. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-13406)
{ "availability": "No subscription required", "binaries": [ { "binary_version": "4.4.0-1028.31", "binary_name": "linux-aws-cloud-tools-4.4.0-1028" }, { "binary_version": "4.4.0-1028.31", "binary_name": "linux-aws-headers-4.4.0-1028" }, { "binary_version": "4.4.0-1028.31", "binary_name": "linux-aws-tools-4.4.0-1028" }, { "binary_version": "4.4.0-1028.31", "binary_name": "linux-cloud-tools-4.4.0-1028-aws" }, { "binary_version": "4.4.0-1028.31", "binary_name": "linux-headers-4.4.0-1028-aws" }, { "binary_version": "4.4.0-1028.31", "binary_name": "linux-image-4.4.0-1028-aws" }, { "binary_version": "4.4.0-1028.31", "binary_name": "linux-tools-4.4.0-1028-aws" } ] }
{ "cves_map": { "ecosystem": "Ubuntu:14.04:LTS", "cves": [ { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "medium" } ], "id": "CVE-2017-13168" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" }, { "type": "Ubuntu", "score": "low" } ], "id": "CVE-2018-10876" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "low" } ], "id": "CVE-2018-10877" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "low" } ], "id": "CVE-2018-10878" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "type": "Ubuntu", "score": "low" } ], "id": "CVE-2018-10879" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "type": "Ubuntu", "score": "low" } ], "id": "CVE-2018-10881" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" }, { "type": "Ubuntu", "score": "low" } ], "id": "CVE-2018-10882" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "medium" } ], "id": "CVE-2018-12233" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "type": "Ubuntu", "score": "low" } ], "id": "CVE-2018-13094" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "medium" } ], "id": "CVE-2018-13405" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "medium" } ], "id": "CVE-2018-13406" } ] } }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "block-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "block-modules-4.4.0-134-generic-lpae-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "block-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "block-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "block-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "crypto-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "crypto-modules-4.4.0-134-generic-lpae-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "crypto-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "crypto-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "crypto-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "fat-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "fat-modules-4.4.0-134-generic-lpae-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "fat-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "fat-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "fat-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "fb-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "firewire-core-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "firewire-core-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "firewire-core-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "firewire-core-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "floppy-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "floppy-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "floppy-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "floppy-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "fs-core-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "fs-core-modules-4.4.0-134-generic-lpae-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "fs-core-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "fs-core-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "fs-core-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "fs-secondary-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "fs-secondary-modules-4.4.0-134-generic-lpae-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "fs-secondary-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "fs-secondary-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "fs-secondary-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "input-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "input-modules-4.4.0-134-generic-lpae-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "input-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "input-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "input-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "ipmi-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "ipmi-modules-4.4.0-134-generic-lpae-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "ipmi-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "ipmi-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "ipmi-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "irda-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "irda-modules-4.4.0-134-generic-lpae-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "irda-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "irda-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "irda-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "kernel-image-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "kernel-image-4.4.0-134-generic-lpae-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "kernel-image-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "kernel-image-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "kernel-image-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-cloud-tools-4.4.0-134-generic" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-cloud-tools-4.4.0-134-lowlatency" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-headers-4.4.0-134" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-headers-4.4.0-134-generic" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-headers-4.4.0-134-generic-lpae" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-headers-4.4.0-134-lowlatency" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-headers-4.4.0-134-powerpc-e500mc" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-headers-4.4.0-134-powerpc-smp" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-headers-4.4.0-134-powerpc64-emb" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-headers-4.4.0-134-powerpc64-smp" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-image-4.4.0-134-generic" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-image-4.4.0-134-generic-lpae" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-image-4.4.0-134-lowlatency" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-image-4.4.0-134-powerpc-e500mc" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-image-4.4.0-134-powerpc-smp" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-image-4.4.0-134-powerpc64-emb" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-image-4.4.0-134-powerpc64-smp" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-image-extra-4.4.0-134-generic" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-lts-xenial-cloud-tools-4.4.0-134" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-lts-xenial-tools-4.4.0-134" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-lts-xenial-udebs-generic" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-lts-xenial-udebs-generic-lpae" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-lts-xenial-udebs-powerpc-e500mc" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-lts-xenial-udebs-powerpc-smp" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-lts-xenial-udebs-powerpc64-smp" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-tools-4.4.0-134-generic" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-tools-4.4.0-134-generic-lpae" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-tools-4.4.0-134-lowlatency" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-tools-4.4.0-134-powerpc-e500mc" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-tools-4.4.0-134-powerpc-smp" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-tools-4.4.0-134-powerpc64-emb" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "linux-tools-4.4.0-134-powerpc64-smp" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "md-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "md-modules-4.4.0-134-generic-lpae-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "md-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "md-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "md-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "message-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "message-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "message-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "message-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "mouse-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "mouse-modules-4.4.0-134-generic-lpae-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "mouse-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "mouse-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "mouse-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "multipath-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "multipath-modules-4.4.0-134-generic-lpae-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "multipath-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "multipath-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "multipath-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "nfs-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "nfs-modules-4.4.0-134-generic-lpae-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "nfs-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "nfs-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "nfs-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "nic-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "nic-modules-4.4.0-134-generic-lpae-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "nic-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "nic-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "nic-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "nic-pcmcia-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "nic-shared-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "nic-shared-modules-4.4.0-134-generic-lpae-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "nic-shared-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "nic-shared-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "nic-shared-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "nic-usb-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "nic-usb-modules-4.4.0-134-generic-lpae-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "nic-usb-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "nic-usb-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "nic-usb-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "parport-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "parport-modules-4.4.0-134-generic-lpae-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "parport-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "parport-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "parport-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "pata-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "pata-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "pata-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "pata-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "pcmcia-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "pcmcia-storage-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "plip-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "plip-modules-4.4.0-134-generic-lpae-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "plip-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "plip-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "plip-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "ppp-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "ppp-modules-4.4.0-134-generic-lpae-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "ppp-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "ppp-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "ppp-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "sata-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "sata-modules-4.4.0-134-generic-lpae-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "sata-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "sata-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "sata-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "scsi-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "scsi-modules-4.4.0-134-generic-lpae-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "scsi-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "scsi-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "scsi-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "serial-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "speakup-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "speakup-modules-4.4.0-134-generic-lpae-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "speakup-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "speakup-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "speakup-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "storage-core-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "storage-core-modules-4.4.0-134-generic-lpae-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "storage-core-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "storage-core-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "storage-core-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "usb-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "usb-modules-4.4.0-134-generic-lpae-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "usb-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "usb-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "usb-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "virtio-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "virtio-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "virtio-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "virtio-modules-4.4.0-134-powerpc64-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "vlan-modules-4.4.0-134-generic-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "vlan-modules-4.4.0-134-generic-lpae-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "vlan-modules-4.4.0-134-powerpc-e500mc-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "vlan-modules-4.4.0-134-powerpc-smp-di" }, { "binary_version": "4.4.0-134.160~14.04.1", "binary_name": "vlan-modules-4.4.0-134-powerpc64-smp-di" } ] }
{ "cves_map": { "ecosystem": "Ubuntu:14.04:LTS", "cves": [ { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "medium" } ], "id": "CVE-2017-13168" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" }, { "type": "Ubuntu", "score": "low" } ], "id": "CVE-2018-10876" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "low" } ], "id": "CVE-2018-10877" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "low" } ], "id": "CVE-2018-10878" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "type": "Ubuntu", "score": "low" } ], "id": "CVE-2018-10879" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "type": "Ubuntu", "score": "low" } ], "id": "CVE-2018-10881" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" }, { "type": "Ubuntu", "score": "low" } ], "id": "CVE-2018-10882" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "medium" } ], "id": "CVE-2018-12233" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "type": "Ubuntu", "score": "low" } ], "id": "CVE-2018-13094" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "medium" } ], "id": "CVE-2018-13405" }, { "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "type": "Ubuntu", "score": "medium" } ], "id": "CVE-2018-13406" } ] } }