{"id":"USN-3583-1","summary":"linux vulnerabilities","details":"It was discovered that an out-of-bounds write vulnerability existed in the\nFlash-Friendly File System (f2fs) in the Linux kernel. An attacker could\nconstruct a malicious file system that, when mounted, could cause a denial\nof service (system crash) or possibly execute arbitrary code.\n(CVE-2017-0750)\n\nIt was discovered that a race condition leading to a use-after-free\nvulnerability existed in the ALSA PCM subsystem of the Linux kernel. A\nlocal attacker could use this to cause a denial of service (system crash)\nor possibly execute arbitrary code. (CVE-2017-0861)\n\nIt was discovered that the KVM implementation in the Linux kernel allowed\npassthrough of the diagnostic I/O port 0x80. An attacker in a guest VM\ncould use this to cause a denial of service (system crash) in the host OS.\n(CVE-2017-1000407)\n\nBo Zhang discovered that the netlink wireless configuration interface in\nthe Linux kernel did not properly validate attributes when handling certain\nrequests. A local attacker with the CAP_NET_ADMIN could use this to cause a\ndenial of service (system crash). (CVE-2017-12153)\n\nVitaly Mayatskikh discovered that the SCSI subsystem in the Linux kernel\ndid not properly track reference counts when merging buffers. A local\nattacker could use this to cause a denial of service (memory exhaustion).\n(CVE-2017-12190)\n\nIt was discovered that the key management subsystem in the Linux kernel did\nnot properly restrict key reads on negatively instantiated keys. A local\nattacker could use this to cause a denial of service (system crash).\n(CVE-2017-12192)\n\nIt was discovered that an integer overflow existed in the sysfs interface\nfor the QLogic 24xx+ series SCSI driver in the Linux kernel. A local\nprivileged attacker could use this to cause a denial of service (system\ncrash). (CVE-2017-14051)\n\nOtto Ebeling discovered that the memory manager in the Linux kernel did not\nproperly check the effective UID in some situations. A local attacker could\nuse this to expose sensitive information. (CVE-2017-14140)\n\nIt was discovered that the ATI Radeon framebuffer driver in the Linux\nkernel did not properly initialize a data structure returned to user space.\nA local attacker could use this to expose sensitive information (kernel\nmemory). (CVE-2017-14156)\n\nChunYu Wang discovered that the iSCSI transport implementation in the Linux\nkernel did not properly validate data structures. A local attacker could\nuse this to cause a denial of service (system crash). (CVE-2017-14489)\n\nJames Patrick-Evans discovered a race condition in the LEGO USB Infrared\nTower driver in the Linux kernel. A physically proximate attacker could use\nthis to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2017-15102)\n\nChunYu Wang discovered that a use-after-free vulnerability existed in the\nSCTP protocol implementation in the Linux kernel. A local attacker could\nuse this to cause a denial of service (system crash) or possibly execute\narbitrary code, (CVE-2017-15115)\n\nIt was discovered that the key management subsystem in the Linux kernel did\nnot properly handle NULL payloads with non-zero length values. A local\nattacker could use this to cause a denial of service (system crash).\n(CVE-2017-15274)\n\nIt was discovered that the Bluebooth Network Encapsulation Protocol (BNEP)\nimplementation in the Linux kernel did not validate the type of socket\npassed in the BNEPCONNADD ioctl(). A local attacker with the CAP_NET_ADMIN\nprivilege could use this to cause a denial of service (system crash) or\npossibly execute arbitrary code. (CVE-2017-15868)\n\nAndrey Konovalov discovered a use-after-free vulnerability in the USB\nserial console driver in the Linux kernel. A physically proximate attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2017-16525)\n\nIt was discovered that the netfilter passive OS fingerprinting (xt_osf)\nmodule did not properly perform access control checks. A local attacker\ncould improperly modify the system-wide OS fingerprint list.\n(CVE-2017-17450)\n\nIt was discovered that the HMAC implementation did not validate the state\nof the underlying cryptographic hash algorithm. A local attacker could use\nthis to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2017-17806)\n\nDenys Fedoryshchenko discovered a use-after-free vulnerability in the\nnetfilter xt_TCPMSS filter of the Linux kernel. A remote attacker could use\nthis to cause a denial of service (system crash). (CVE-2017-18017)\n\nGareth Evans discovered that the shm IPC subsystem in the Linux kernel did\nnot properly restrict mapping page zero. A local privileged attacker could\nuse this to execute arbitrary code. (CVE-2017-5669)\n\nIt was discovered that an integer overflow vulnerability existing in the\nIPv6 implementation in the Linux kernel. A local attacker could use this to\ncause a denial of service (infinite loop). (CVE-2017-7542)\n\nTommi Rantala and Brad Spengler discovered that the memory manager in the\nLinux kernel did not properly enforce the CONFIG_STRICT_DEVMEM protection\nmechanism. A local attacker with access to /dev/mem could use this to\nexpose sensitive information or possibly execute arbitrary code.\n(CVE-2017-7889)\n\nMohamed Ghannam discovered a use-after-free vulnerability in the DCCP\nprotocol implementation in the Linux kernel. A local attacker could use\nthis to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2017-8824)\n\nMohamed Ghannam discovered a null pointer dereference in the RDS (Reliable\nDatagram Sockets) protocol implementation of the Linux kernel. A local\nattacker could use this to cause a denial of service (system crash).\n(CVE-2018-5333)\n\n范龙飞 discovered that a race condition existed in loop block device\nimplementation in the Linux kernel. A local attacker could use this to\ncause a denial of service (system crash) or possibly execute arbitrary\ncode. (CVE-2018-5344)\n\nUSN-3524-1 mitigated CVE-2017-5754 (Meltdown) for the amd64\narchitecture in Ubuntu 14.04 LTS. This update provides the\ncorresponding mitigations for the ppc64el architecture. Original\nadvisory details:\n\n Jann Horn discovered that microprocessors utilizing speculative execution\n and indirect branch prediction may allow unauthorized memory reads via\n sidechannel attacks. This flaw is known as Meltdown. A local attacker could\n use this to expose sensitive information, including kernel memory.\n (CVE-2017-5754)\n\n","modified":"2026-02-10T04:41:17Z","published":"2018-02-23T09:14:24Z","related":["UBUNTU-CVE-2017-0750","UBUNTU-CVE-2017-0861","UBUNTU-CVE-2017-1000407","UBUNTU-CVE-2017-12153","UBUNTU-CVE-2017-12190","UBUNTU-CVE-2017-12192","UBUNTU-CVE-2017-14051","UBUNTU-CVE-2017-14140","UBUNTU-CVE-2017-14156","UBUNTU-CVE-2017-14489","UBUNTU-CVE-2017-15102","UBUNTU-CVE-2017-15115","UBUNTU-CVE-2017-15274","UBUNTU-CVE-2017-15868","UBUNTU-CVE-2017-16525","UBUNTU-CVE-2017-17450","UBUNTU-CVE-2017-17806","UBUNTU-CVE-2017-18017","UBUNTU-CVE-2017-5669","UBUNTU-CVE-2017-5754","UBUNTU-CVE-2017-7542","UBUNTU-CVE-2017-7889","UBUNTU-CVE-2017-8824","UBUNTU-CVE-2018-5333","UBUNTU-CVE-2018-5344"],"upstream":["CVE-2017-0750","CVE-2017-0861","CVE-2017-1000407","CVE-2017-12153","CVE-2017-12190","CVE-2017-12192","CVE-2017-14051","CVE-2017-14140","CVE-2017-14156","CVE-2017-14489","CVE-2017-15102","CVE-2017-15115","CVE-2017-15274","CVE-2017-15868","CVE-2017-16525","CVE-2017-17450","CVE-2017-17806","CVE-2017-18017","CVE-2017-5669","CVE-2017-5754","CVE-2017-7542","CVE-2017-7889","CVE-2017-8824","CVE-2018-5333","CVE-2018-5344","UBUNTU-CVE-2017-0750","UBUNTU-CVE-2017-0861","UBUNTU-CVE-2017-1000407","UBUNTU-CVE-2017-12153","UBUNTU-CVE-2017-12190","UBUNTU-CVE-2017-12192","UBUNTU-CVE-2017-14051","UBUNTU-CVE-2017-14140","UBUNTU-CVE-2017-14156","UBUNTU-CVE-2017-14489","UBUNTU-CVE-2017-15102","UBUNTU-CVE-2017-15115","UBUNTU-CVE-2017-15274","UBUNTU-CVE-2017-15868","UBUNTU-CVE-2017-16525","UBUNTU-CVE-2017-17450","UBUNTU-CVE-2017-17806","UBUNTU-CVE-2017-18017","UBUNTU-CVE-2017-5669","UBUNTU-CVE-2017-5754","UBUNTU-CVE-2017-7542","UBUNTU-CVE-2017-7889","UBUNTU-CVE-2017-8824","UBUNTU-CVE-2018-5333","UBUNTU-CVE-2018-5344"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3583-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-0750"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-0861"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-5669"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-5754"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7542"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-7889"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-8824"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-12153"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-12190"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-12192"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-14051"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-14140"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-14156"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-14489"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-15102"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-15115"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-15274"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-15868"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16525"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17450"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17806"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-18017"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-1000407"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-5333"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-5344"}],"affected":[{"package":{"name":"linux","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/linux@3.13.0-142.191?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.13.0-142.191"}]}],"versions":["3.11.0-12.19","3.12.0-1.3","3.12.0-2.5","3.12.0-2.7","3.12.0-3.8","3.12.0-3.9","3.12.0-4.10","3.12.0-4.12","3.12.0-5.13","3.12.0-7.15","3.13.0-1.16","3.13.0-2.17","3.13.0-3.18","3.13.0-4.19","3.13.0-5.20","3.13.0-6.23","3.13.0-7.25","3.13.0-7.26","3.13.0-8.27","3.13.0-8.28","3.13.0-10.30","3.13.0-11.31","3.13.0-12.32","3.13.0-13.33","3.13.0-14.34","3.13.0-15.35","3.13.0-16.36","3.13.0-17.37","3.13.0-18.38","3.13.0-19.39","3.13.0-19.40","3.13.0-20.42","3.13.0-21.43","3.13.0-22.44","3.13.0-23.45","3.13.0-24.46","3.13.0-24.47","3.13.0-27.50","3.13.0-29.53","3.13.0-30.54","3.13.0-30.55","3.13.0-32.57","3.13.0-33.58","3.13.0-34.60","3.13.0-35.62","3.13.0-36.63","3.13.0-37.64","3.13.0-39.66","3.13.0-40.69","3.13.0-41.70","3.13.0-43.72","3.13.0-44.73","3.13.0-45.74","3.13.0-46.75","3.13.0-46.76","3.13.0-46.77","3.13.0-46.79","3.13.0-48.80","3.13.0-49.81","3.13.0-49.83","3.13.0-51.84","3.13.0-52.85","3.13.0-52.86","3.13.0-53.88","3.13.0-53.89","3.13.0-54.91","3.13.0-55.92","3.13.0-55.94","3.13.0-57.95","3.13.0-58.97","3.13.0-59.98","3.13.0-61.100","3.13.0-62.102","3.13.0-63.103","3.13.0-65.105","3.13.0-65.106","3.13.0-66.108","3.13.0-67.110","3.13.0-68.111","3.13.0-70.113","3.13.0-71.114","3.13.0-73.116","3.13.0-74.118","3.13.0-76.120","3.13.0-77.121","3.13.0-79.123","3.13.0-83.127","3.13.0-85.129","3.13.0-86.130","3.13.0-86.131","3.13.0-87.133","3.13.0-88.135","3.13.0-91.138","3.13.0-92.139","3.13.0-93.140","3.13.0-95.142","3.13.0-96.143","3.13.0-98.145","3.13.0-100.147","3.13.0-101.148","3.13.0-103.150","3.13.0-105.152","3.13.0-106.153","3.13.0-107.154","3.13.0-108.155","3.13.0-109.156","3.13.0-110.157","3.13.0-111.158","3.13.0-112.159","3.13.0-113.160","3.13.0-115.162","3.13.0-116.163","3.13.0-117.164","3.13.0-119.166","3.13.0-121.170","3.13.0-123.172","3.13.0-125.174","3.13.0-126.175","3.13.0-128.177","3.13.0-129.178","3.13.0-132.181","3.13.0-133.182","3.13.0-135.184","3.13.0-137.186","3.13.0-139.188","3.13.0-141.190"],"ecosystem_specific":{"binaries":[{"binary_name":"block-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"block-modules-3.13.0-142-generic-lpae-di","binary_version":"3.13.0-142.191"},{"binary_name":"block-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"block-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"block-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"block-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"crypto-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"crypto-modules-3.13.0-142-generic-lpae-di","binary_version":"3.13.0-142.191"},{"binary_name":"crypto-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"crypto-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"crypto-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"crypto-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"fat-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"fat-modules-3.13.0-142-generic-lpae-di","binary_version":"3.13.0-142.191"},{"binary_name":"fat-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"fat-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"fat-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"fat-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"fb-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"firewire-core-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"firewire-core-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"firewire-core-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"firewire-core-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"firewire-core-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"floppy-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"floppy-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"floppy-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"floppy-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"floppy-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"fs-core-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"fs-core-modules-3.13.0-142-generic-lpae-di","binary_version":"3.13.0-142.191"},{"binary_name":"fs-core-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"fs-core-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"fs-core-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"fs-core-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"fs-secondary-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"fs-secondary-modules-3.13.0-142-generic-lpae-di","binary_version":"3.13.0-142.191"},{"binary_name":"fs-secondary-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"fs-secondary-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"fs-secondary-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"fs-secondary-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"input-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"input-modules-3.13.0-142-generic-lpae-di","binary_version":"3.13.0-142.191"},{"binary_name":"input-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"input-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"input-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"input-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"ipmi-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"ipmi-modules-3.13.0-142-generic-lpae-di","binary_version":"3.13.0-142.191"},{"binary_name":"ipmi-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"ipmi-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"ipmi-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"ipmi-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"irda-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"irda-modules-3.13.0-142-generic-lpae-di","binary_version":"3.13.0-142.191"},{"binary_name":"irda-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"irda-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"irda-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"irda-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"kernel-image-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"kernel-image-3.13.0-142-generic-lpae-di","binary_version":"3.13.0-142.191"},{"binary_name":"kernel-image-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"kernel-image-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"kernel-image-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"kernel-image-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"linux-cloud-tools-3.13.0-142","binary_version":"3.13.0-142.191"},{"binary_name":"linux-cloud-tools-3.13.0-142-generic","binary_version":"3.13.0-142.191"},{"binary_name":"linux-cloud-tools-3.13.0-142-lowlatency","binary_version":"3.13.0-142.191"},{"binary_name":"linux-cloud-tools-common","binary_version":"3.13.0-142.191"},{"binary_name":"linux-headers-3.13.0-142","binary_version":"3.13.0-142.191"},{"binary_name":"linux-headers-3.13.0-142-generic","binary_version":"3.13.0-142.191"},{"binary_name":"linux-headers-3.13.0-142-generic-lpae","binary_version":"3.13.0-142.191"},{"binary_name":"linux-headers-3.13.0-142-lowlatency","binary_version":"3.13.0-142.191"},{"binary_name":"linux-headers-3.13.0-142-powerpc-e500","binary_version":"3.13.0-142.191"},{"binary_name":"linux-headers-3.13.0-142-powerpc-e500mc","binary_version":"3.13.0-142.191"},{"binary_name":"linux-headers-3.13.0-142-powerpc-smp","binary_version":"3.13.0-142.191"},{"binary_name":"linux-headers-3.13.0-142-powerpc64-emb","binary_version":"3.13.0-142.191"},{"binary_name":"linux-headers-3.13.0-142-powerpc64-smp","binary_version":"3.13.0-142.191"},{"binary_name":"linux-image-3.13.0-142-generic","binary_version":"3.13.0-142.191"},{"binary_name":"linux-image-3.13.0-142-generic-lpae","binary_version":"3.13.0-142.191"},{"binary_name":"linux-image-3.13.0-142-lowlatency","binary_version":"3.13.0-142.191"},{"binary_name":"linux-image-3.13.0-142-powerpc-e500","binary_version":"3.13.0-142.191"},{"binary_name":"linux-image-3.13.0-142-powerpc-e500mc","binary_version":"3.13.0-142.191"},{"binary_name":"linux-image-3.13.0-142-powerpc-smp","binary_version":"3.13.0-142.191"},{"binary_name":"linux-image-3.13.0-142-powerpc64-emb","binary_version":"3.13.0-142.191"},{"binary_name":"linux-image-3.13.0-142-powerpc64-smp","binary_version":"3.13.0-142.191"},{"binary_name":"linux-image-extra-3.13.0-142-generic","binary_version":"3.13.0-142.191"},{"binary_name":"linux-libc-dev","binary_version":"3.13.0-142.191"},{"binary_name":"linux-source-3.13.0","binary_version":"3.13.0-142.191"},{"binary_name":"linux-tools-3.13.0-142","binary_version":"3.13.0-142.191"},{"binary_name":"linux-tools-3.13.0-142-generic","binary_version":"3.13.0-142.191"},{"binary_name":"linux-tools-3.13.0-142-generic-lpae","binary_version":"3.13.0-142.191"},{"binary_name":"linux-tools-3.13.0-142-lowlatency","binary_version":"3.13.0-142.191"},{"binary_name":"linux-tools-3.13.0-142-powerpc-e500","binary_version":"3.13.0-142.191"},{"binary_name":"linux-tools-3.13.0-142-powerpc-e500mc","binary_version":"3.13.0-142.191"},{"binary_name":"linux-tools-3.13.0-142-powerpc-smp","binary_version":"3.13.0-142.191"},{"binary_name":"linux-tools-3.13.0-142-powerpc64-emb","binary_version":"3.13.0-142.191"},{"binary_name":"linux-tools-3.13.0-142-powerpc64-smp","binary_version":"3.13.0-142.191"},{"binary_name":"linux-tools-common","binary_version":"3.13.0-142.191"},{"binary_name":"linux-udebs-generic","binary_version":"3.13.0-142.191"},{"binary_name":"linux-udebs-generic-lpae","binary_version":"3.13.0-142.191"},{"binary_name":"linux-udebs-powerpc-e500","binary_version":"3.13.0-142.191"},{"binary_name":"linux-udebs-powerpc-e500mc","binary_version":"3.13.0-142.191"},{"binary_name":"linux-udebs-powerpc-smp","binary_version":"3.13.0-142.191"},{"binary_name":"linux-udebs-powerpc64-smp","binary_version":"3.13.0-142.191"},{"binary_name":"md-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"md-modules-3.13.0-142-generic-lpae-di","binary_version":"3.13.0-142.191"},{"binary_name":"md-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"md-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"md-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"md-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"message-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"message-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"message-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"message-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"message-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"mouse-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"mouse-modules-3.13.0-142-generic-lpae-di","binary_version":"3.13.0-142.191"},{"binary_name":"mouse-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"mouse-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"mouse-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"mouse-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"multipath-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"multipath-modules-3.13.0-142-generic-lpae-di","binary_version":"3.13.0-142.191"},{"binary_name":"multipath-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"multipath-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"multipath-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"multipath-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"nfs-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"nfs-modules-3.13.0-142-generic-lpae-di","binary_version":"3.13.0-142.191"},{"binary_name":"nfs-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"nfs-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"nfs-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"nfs-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"nic-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"nic-modules-3.13.0-142-generic-lpae-di","binary_version":"3.13.0-142.191"},{"binary_name":"nic-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"nic-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"nic-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"nic-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"nic-pcmcia-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"nic-shared-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"nic-shared-modules-3.13.0-142-generic-lpae-di","binary_version":"3.13.0-142.191"},{"binary_name":"nic-shared-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"nic-shared-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"nic-shared-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"nic-shared-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"nic-usb-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"nic-usb-modules-3.13.0-142-generic-lpae-di","binary_version":"3.13.0-142.191"},{"binary_name":"nic-usb-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"nic-usb-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"nic-usb-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"nic-usb-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"parport-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"parport-modules-3.13.0-142-generic-lpae-di","binary_version":"3.13.0-142.191"},{"binary_name":"parport-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"parport-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"parport-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"parport-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"pata-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"pata-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"pata-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"pata-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"pata-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"pcmcia-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"pcmcia-storage-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"plip-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"plip-modules-3.13.0-142-generic-lpae-di","binary_version":"3.13.0-142.191"},{"binary_name":"plip-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"plip-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"plip-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"plip-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"ppp-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"ppp-modules-3.13.0-142-generic-lpae-di","binary_version":"3.13.0-142.191"},{"binary_name":"ppp-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"ppp-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"ppp-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"ppp-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"sata-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"sata-modules-3.13.0-142-generic-lpae-di","binary_version":"3.13.0-142.191"},{"binary_name":"sata-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"sata-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"sata-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"sata-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"scsi-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"scsi-modules-3.13.0-142-generic-lpae-di","binary_version":"3.13.0-142.191"},{"binary_name":"scsi-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"scsi-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"scsi-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"scsi-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"serial-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"speakup-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"speakup-modules-3.13.0-142-generic-lpae-di","binary_version":"3.13.0-142.191"},{"binary_name":"speakup-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"speakup-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"speakup-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"speakup-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"squashfs-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"squashfs-modules-3.13.0-142-generic-lpae-di","binary_version":"3.13.0-142.191"},{"binary_name":"squashfs-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"squashfs-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"squashfs-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"squashfs-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"storage-core-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"storage-core-modules-3.13.0-142-generic-lpae-di","binary_version":"3.13.0-142.191"},{"binary_name":"storage-core-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"storage-core-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"storage-core-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"storage-core-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"usb-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"usb-modules-3.13.0-142-generic-lpae-di","binary_version":"3.13.0-142.191"},{"binary_name":"usb-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"usb-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"usb-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"usb-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"virtio-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"virtio-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"virtio-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"virtio-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"virtio-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"vlan-modules-3.13.0-142-generic-di","binary_version":"3.13.0-142.191"},{"binary_name":"vlan-modules-3.13.0-142-generic-lpae-di","binary_version":"3.13.0-142.191"},{"binary_name":"vlan-modules-3.13.0-142-powerpc-e500-di","binary_version":"3.13.0-142.191"},{"binary_name":"vlan-modules-3.13.0-142-powerpc-e500mc-di","binary_version":"3.13.0-142.191"},{"binary_name":"vlan-modules-3.13.0-142-powerpc-smp-di","binary_version":"3.13.0-142.191"},{"binary_name":"vlan-modules-3.13.0-142-powerpc64-smp-di","binary_version":"3.13.0-142.191"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-0750"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-0861"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-5669"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-7542"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-7889"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-8824"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-12153"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-12190"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-12192"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-14051"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-14140"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-14156"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-14489"},{"severity":[{"score":"CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-15102"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-15115"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-15274"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-15868"},{"severity":[{"score":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2017-16525"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-17450"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-17806"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-18017"},{"severity":[{"score":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2017-1000407"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2018-5333"},{"severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2018-5344"}],"ecosystem":"Ubuntu:14.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3583-1.json"}}],"schema_version":"1.7.3"}