{"id":"USN-3617-2","summary":"linux-hwe, linux-gcp, linux-oem vulnerabilities","details":"USN-3617-1 fixed vulnerabilities in the Linux kernel for Ubuntu 17.10.\nThis update provides the corresponding updates for the Linux Hardware\nEnablement (HWE) kernel from Ubuntu 17.10 for Ubuntu 16.04 LTS.\n\nIt was discovered that a race condition leading to a use-after-free\nvulnerability existed in the ALSA PCM subsystem of the Linux kernel. A\nlocal attacker could use this to cause a denial of service (system crash)\nor possibly execute arbitrary code. (CVE-2017-0861)\n\nIt was discovered that the KVM implementation in the Linux kernel allowed\npassthrough of the diagnostic I/O port 0x80. An attacker in a guest VM\ncould use this to cause a denial of service (system crash) in the host OS.\n(CVE-2017-1000407)\n\nIt was discovered that a use-after-free vulnerability existed in the\nnetwork namespaces implementation in the Linux kernel. A local attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2017-15129)\n\nAndrey Konovalov discovered that the usbtest device driver in the Linux\nkernel did not properly validate endpoint metadata. A physically proximate\nattacker could use this to cause a denial of service (system crash).\n(CVE-2017-16532)\n\nAndrey Konovalov discovered that the SoundGraph iMON USB driver in the\nLinux kernel did not properly validate device metadata. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). (CVE-2017-16537)\n\nAndrey Konovalov discovered that the IMS Passenger Control Unit USB driver\nin the Linux kernel did not properly validate device descriptors. A\nphysically proximate attacker could use this to cause a denial of service\n(system crash). (CVE-2017-16645)\n\nAndrey Konovalov discovered that the DiBcom DiB0700 USB DVB driver in the\nLinux kernel did not properly handle detach events. A physically proximate\nattacker could use this to cause a denial of service (system crash).\n(CVE-2017-16646)\n\nAndrey Konovalov discovered that the ASIX Ethernet USB driver in the Linux\nkernel did not properly handle suspend and resume events. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). (CVE-2017-16647)\n\nAndrey Konovalov discovered that the CDC USB Ethernet driver did not\nproperly validate device descriptors. A physically proximate attacker could\nuse this to cause a denial of service (system crash). (CVE-2017-16649)\n\nAndrey Konovalov discovered that the QMI WWAN USB driver did not properly\nvalidate device descriptors. A physically proximate attacker could use this\nto cause a denial of service (system crash). (CVE-2017-16650)\n\nIt was discovered that the HugeTLB component of the Linux kernel did not\nproperly handle holes in hugetlb ranges. A local attacker could use this to\nexpose sensitive information (kernel memory). (CVE-2017-16994)\n\nIt was discovered that the netfilter component of the Linux did not\nproperly restrict access to the connection tracking helpers list. A local\nattacker could use this to bypass intended access restrictions.\n(CVE-2017-17448)\n\nIt was discovered that the netfilter passive OS fingerprinting (xt_osf)\nmodule did not properly perform access control checks. A local attacker\ncould improperly modify the system-wide OS fingerprint list.\n(CVE-2017-17450)\n\nDmitry Vyukov discovered that the KVM implementation in the Linux kernel\ncontained an out-of-bounds read when handling memory-mapped I/O. A local\nattacker could use this to expose sensitive information. (CVE-2017-17741)\n\nIt was discovered that the Salsa20 encryption algorithm implementations in\nthe Linux kernel did not properly handle zero-length inputs. A local\nattacker could use this to cause a denial of service (system crash).\n(CVE-2017-17805)\n\nIt was discovered that the HMAC implementation did not validate the state\nof the underlying cryptographic hash algorithm. A local attacker could use\nthis to cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2017-17806)\n\nIt was discovered that the keyring implementation in the Linux kernel did\nnot properly check permissions when a key request was performed on a task's\ndefault keyring. A local attacker could use this to add keys to\nunauthorized keyrings. (CVE-2017-17807)\n\nIt was discovered that a race condition existed in the OCFS2 file system\nimplementation in the Linux kernel. A local attacker could use this to\ncause a denial of service (kernel deadlock). (CVE-2017-18204)\n\nIt was discovered that the Broadcom NetXtremeII ethernet driver in the\nLinux kernel did not properly validate Generic Segment Offload (GSO) packet\nsizes. An attacker could use this to cause a denial of service (interface\nunavailability). (CVE-2018-1000026)\n\nIt was discovered that the Reliable Datagram Socket (RDS) implementation in\nthe Linux kernel contained an out-of-bounds write during RDMA page allocation. An\nattacker could use this to cause a denial of service (system crash) or\npossibly execute arbitrary code. (CVE-2018-5332)\n\nMohamed Ghannam discovered a null pointer dereference in the RDS (Reliable\nDatagram Sockets) protocol implementation of the Linux kernel. A local\nattacker could use this to cause a denial of service (system crash).\n(CVE-2018-5333)\n\n范龙飞 discovered that a race condition existed in loop block device\nimplementation in the Linux kernel. A local attacker could use this to\ncause a denial of service (system crash) or possibly execute arbitrary\ncode. (CVE-2018-5344)\n","modified":"2026-02-10T04:41:18Z","published":"2018-04-03T19:40:58Z","related":["UBUNTU-CVE-2017-0861","UBUNTU-CVE-2017-1000407","UBUNTU-CVE-2017-15129","UBUNTU-CVE-2017-16532","UBUNTU-CVE-2017-16537","UBUNTU-CVE-2017-16645","UBUNTU-CVE-2017-16646","UBUNTU-CVE-2017-16647","UBUNTU-CVE-2017-16649","UBUNTU-CVE-2017-16650","UBUNTU-CVE-2017-16994","UBUNTU-CVE-2017-17448","UBUNTU-CVE-2017-17450","UBUNTU-CVE-2017-17741","UBUNTU-CVE-2017-17805","UBUNTU-CVE-2017-17806","UBUNTU-CVE-2017-17807","UBUNTU-CVE-2017-18204","UBUNTU-CVE-2018-1000026","UBUNTU-CVE-2018-5332","UBUNTU-CVE-2018-5333","UBUNTU-CVE-2018-5344"],"upstream":["CVE-2017-0861","CVE-2017-1000407","CVE-2017-15129","CVE-2017-16532","CVE-2017-16537","CVE-2017-16645","CVE-2017-16646","CVE-2017-16647","CVE-2017-16649","CVE-2017-16650","CVE-2017-16994","CVE-2017-17448","CVE-2017-17450","CVE-2017-17741","CVE-2017-17805","CVE-2017-17806","CVE-2017-17807","CVE-2017-18204","CVE-2018-1000026","CVE-2018-5332","CVE-2018-5333","CVE-2018-5344","UBUNTU-CVE-2017-0861","UBUNTU-CVE-2017-1000407","UBUNTU-CVE-2017-15129","UBUNTU-CVE-2017-16532","UBUNTU-CVE-2017-16537","UBUNTU-CVE-2017-16645","UBUNTU-CVE-2017-16646","UBUNTU-CVE-2017-16647","UBUNTU-CVE-2017-16649","UBUNTU-CVE-2017-16650","UBUNTU-CVE-2017-16994","UBUNTU-CVE-2017-17448","UBUNTU-CVE-2017-17450","UBUNTU-CVE-2017-17741","UBUNTU-CVE-2017-17805","UBUNTU-CVE-2017-17806","UBUNTU-CVE-2017-17807","UBUNTU-CVE-2017-18204","UBUNTU-CVE-2018-1000026","UBUNTU-CVE-2018-5332","UBUNTU-CVE-2018-5333","UBUNTU-CVE-2018-5344"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3617-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-0861"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-15129"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16532"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16537"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16645"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16646"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16647"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16649"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16650"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16994"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17448"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17450"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17741"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17805"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17806"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-17807"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-18204"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-1000407"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-5332"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-5333"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-5344"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-1000026"}],"affected":[{"package":{"name":"linux-gcp","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/linux-gcp@4.13.0-1012.16?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.13.0-1012.16"}]}],"versions":["4.10.0-1004.4","4.10.0-1006.6","4.10.0-1007.7","4.10.0-1008.8","4.10.0-1009.9","4.13.0-1002.5","4.13.0-1006.9","4.13.0-1007.10","4.13.0-1008.11","4.13.0-1011.15"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.13.0-1012.16","binary_name":"linux-cloud-tools-4.13.0-1012-gcp"},{"binary_version":"4.13.0-1012.16","binary_name":"linux-gcp-cloud-tools-4.13.0-1012"},{"binary_version":"4.13.0-1012.16","binary_name":"linux-gcp-headers-4.13.0-1012"},{"binary_version":"4.13.0-1012.16","binary_name":"linux-gcp-tools-4.13.0-1012"},{"binary_version":"4.13.0-1012.16","binary_name":"linux-headers-4.13.0-1012-gcp"},{"binary_version":"4.13.0-1012.16","binary_name":"linux-image-4.13.0-1012-gcp"},{"binary_version":"4.13.0-1012.16","binary_name":"linux-image-extra-4.13.0-1012-gcp"},{"binary_version":"4.13.0-1012.16","binary_name":"linux-tools-4.13.0-1012-gcp"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-0861"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-15129"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16532"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16537"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16645"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16646"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16647"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16649"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16650"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-16994"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17448"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17450"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17741"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17805"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17806"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17807"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-18204"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-1000407"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-5332"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-5333"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-5344"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-1000026"}],"ecosystem":"Ubuntu:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3617-2.json"}},{"package":{"name":"linux-hwe","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/linux-hwe@4.13.0-38.43~16.04.1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.13.0-38.43~16.04.1"}]}],"versions":["4.8.0-36.36~16.04.1","4.8.0-39.42~16.04.1","4.8.0-41.44~16.04.1","4.8.0-42.45~16.04.1","4.8.0-44.47~16.04.1","4.8.0-45.48~16.04.1","4.8.0-46.49~16.04.1","4.8.0-49.52~16.04.1","4.8.0-51.54~16.04.1","4.8.0-52.55~16.04.1","4.8.0-53.56~16.04.1","4.8.0-54.57~16.04.1","4.8.0-56.61~16.04.1","4.8.0-58.63~16.04.1","4.10.0-27.30~16.04.2","4.10.0-28.32~16.04.2","4.10.0-30.34~16.04.1","4.10.0-32.36~16.04.1","4.10.0-33.37~16.04.1","4.10.0-35.39~16.04.1","4.10.0-37.41~16.04.1","4.10.0-38.42~16.04.1","4.10.0-40.44~16.04.1","4.10.0-42.46~16.04.1","4.13.0-26.29~16.04.2","4.13.0-31.34~16.04.1","4.13.0-32.35~16.04.1","4.13.0-36.40~16.04.1","4.13.0-37.42~16.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"block-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"block-modules-4.13.0-38-generic-lpae-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"crypto-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"crypto-modules-4.13.0-38-generic-lpae-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"dasd-extra-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"dasd-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"fat-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"fat-modules-4.13.0-38-generic-lpae-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"fb-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"firewire-core-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"floppy-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"fs-core-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"fs-core-modules-4.13.0-38-generic-lpae-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"fs-secondary-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"fs-secondary-modules-4.13.0-38-generic-lpae-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"input-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"input-modules-4.13.0-38-generic-lpae-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"ipmi-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"ipmi-modules-4.13.0-38-generic-lpae-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"irda-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"irda-modules-4.13.0-38-generic-lpae-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"kernel-image-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"kernel-image-4.13.0-38-generic-lpae-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"linux-cloud-tools-4.13.0-38-generic"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"linux-cloud-tools-4.13.0-38-lowlatency"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"linux-headers-4.13.0-38"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"linux-headers-4.13.0-38-generic"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"linux-headers-4.13.0-38-generic-lpae"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"linux-headers-4.13.0-38-lowlatency"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"linux-hwe-cloud-tools-4.13.0-38"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"linux-hwe-tools-4.13.0-38"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"linux-hwe-udebs-generic"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"linux-hwe-udebs-generic-lpae"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"linux-image-4.13.0-38-generic"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"linux-image-4.13.0-38-generic-lpae"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"linux-image-4.13.0-38-lowlatency"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"linux-image-extra-4.13.0-38-generic"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"linux-source-4.13.0"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"linux-tools-4.13.0-38-generic"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"linux-tools-4.13.0-38-generic-lpae"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"linux-tools-4.13.0-38-lowlatency"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"md-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"md-modules-4.13.0-38-generic-lpae-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"message-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"mouse-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"mouse-modules-4.13.0-38-generic-lpae-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"multipath-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"multipath-modules-4.13.0-38-generic-lpae-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"nfs-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"nfs-modules-4.13.0-38-generic-lpae-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"nic-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"nic-modules-4.13.0-38-generic-lpae-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"nic-pcmcia-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"nic-shared-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"nic-shared-modules-4.13.0-38-generic-lpae-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"nic-usb-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"nic-usb-modules-4.13.0-38-generic-lpae-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"parport-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"parport-modules-4.13.0-38-generic-lpae-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"pata-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"pcmcia-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"pcmcia-storage-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"plip-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"plip-modules-4.13.0-38-generic-lpae-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"ppp-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"ppp-modules-4.13.0-38-generic-lpae-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"sata-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"sata-modules-4.13.0-38-generic-lpae-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"scsi-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"scsi-modules-4.13.0-38-generic-lpae-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"serial-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"storage-core-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"storage-core-modules-4.13.0-38-generic-lpae-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"usb-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"usb-modules-4.13.0-38-generic-lpae-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"virtio-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"vlan-modules-4.13.0-38-generic-di"},{"binary_version":"4.13.0-38.43~16.04.1","binary_name":"vlan-modules-4.13.0-38-generic-lpae-di"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-0861"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-15129"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16532"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16537"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16645"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16646"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16647"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16649"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16650"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-16994"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17448"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17450"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17741"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17805"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17806"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17807"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-18204"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-1000407"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-5332"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-5333"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-5344"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-1000026"}],"ecosystem":"Ubuntu:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3617-2.json"}},{"package":{"name":"linux-oem","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/linux-oem@4.13.0-1022.24?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.13.0-1022.24"}]}],"versions":["4.13.0-1008.9","4.13.0-1010.11","4.13.0-1012.13","4.13.0-1015.16","4.13.0-1017.18","4.13.0-1019.20","4.13.0-1020.21","4.13.0-1021.23"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.13.0-1022.24","binary_name":"block-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"crypto-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"fat-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"fb-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"firewire-core-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"floppy-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"fs-core-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"fs-secondary-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"input-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"ipmi-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"irda-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"kernel-image-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"linux-headers-4.13.0-1022-oem"},{"binary_version":"4.13.0-1022.24","binary_name":"linux-image-4.13.0-1022-oem"},{"binary_version":"4.13.0-1022.24","binary_name":"linux-oem-headers-4.13.0-1022"},{"binary_version":"4.13.0-1022.24","binary_name":"linux-oem-tools-4.13.0-1022"},{"binary_version":"4.13.0-1022.24","binary_name":"linux-tools-4.13.0-1022-oem"},{"binary_version":"4.13.0-1022.24","binary_name":"linux-udebs-oem"},{"binary_version":"4.13.0-1022.24","binary_name":"md-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"message-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"mouse-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"multipath-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"nfs-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"nic-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"nic-pcmcia-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"nic-shared-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"nic-usb-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"parport-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"pata-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"pcmcia-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"pcmcia-storage-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"plip-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"ppp-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"sata-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"scsi-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"serial-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"storage-core-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"usb-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"virtio-modules-4.13.0-1022-oem-di"},{"binary_version":"4.13.0-1022.24","binary_name":"vlan-modules-4.13.0-1022-oem-di"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-0861"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-15129"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16532"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16537"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16645"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16646"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16647"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16649"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2017-16650"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-16994"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17448"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17450"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17741"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17805"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17806"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-17807"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-18204"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2017-1000407"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-5332"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-5333"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-5344"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2018-1000026"}],"ecosystem":"Ubuntu:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3617-2.json"}}],"schema_version":"1.7.3"}