{"id":"USN-4068-1","summary":"linux, linux-aws, linux-gcp, linux-kvm, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities","details":"Adam Zabrocki discovered that the Intel i915 kernel mode graphics driver in\nthe Linux kernel did not properly restrict mmap() ranges in some\nsituations. A local attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2019-11085)\n\nIt was discovered that a race condition leading to a use-after-free existed\nin the Reliable Datagram Sockets (RDS) protocol implementation in the Linux\nkernel. The RDS protocol is disabled via blocklist by default in Ubuntu. \nIf enabled, a local attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2019-11815)\n\nIt was discovered that the ext4 file system implementation in the Linux\nkernel did not properly zero out memory in some situations. A local\nattacker could use this to expose sensitive information (kernel memory).\n(CVE-2019-11833)\n\nIt was discovered that the Bluetooth Human Interface Device Protocol (HIDP)\nimplementation in the Linux kernel did not properly verify strings were\nNULL terminated in certain situations. A local attacker could use this to\nexpose sensitive information (kernel memory). (CVE-2019-11884)\n","modified":"2026-04-27T15:26:03.457632Z","published":"2019-07-23T03:20:44Z","related":["UBUNTU-CVE-2019-11085","UBUNTU-CVE-2019-11815","UBUNTU-CVE-2019-11833","UBUNTU-CVE-2019-11884"],"upstream":["CVE-2019-11085","CVE-2019-11815","CVE-2019-11833","CVE-2019-11884","UBUNTU-CVE-2019-11085","UBUNTU-CVE-2019-11815","UBUNTU-CVE-2019-11833","UBUNTU-CVE-2019-11884"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4068-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-11085"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-11815"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-11833"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-11884"}],"affected":[{"package":{"name":"linux","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux@4.15.0-55.60?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-55.60"}]}],"versions":["4.13.0-16.19","4.13.0-17.20","4.13.0-25.29","4.13.0-32.35","4.15.0-10.11","4.15.0-12.13","4.15.0-13.14","4.15.0-15.16","4.15.0-19.20","4.15.0-20.21","4.15.0-22.24","4.15.0-23.25","4.15.0-24.26","4.15.0-29.31","4.15.0-30.32","4.15.0-32.35","4.15.0-33.36","4.15.0-34.37","4.15.0-36.39","4.15.0-38.41","4.15.0-39.42","4.15.0-42.45","4.15.0-43.46","4.15.0-44.47","4.15.0-45.48","4.15.0-46.49","4.15.0-47.50","4.15.0-48.51","4.15.0-50.54","4.15.0-51.55","4.15.0-52.56","4.15.0-54.58"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.15.0-55.60","binary_name":"block-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"block-modules-4.15.0-55-generic-lpae-di"},{"binary_version":"4.15.0-55.60","binary_name":"crypto-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"crypto-modules-4.15.0-55-generic-lpae-di"},{"binary_version":"4.15.0-55.60","binary_name":"dasd-extra-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"dasd-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"fat-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"fat-modules-4.15.0-55-generic-lpae-di"},{"binary_version":"4.15.0-55.60","binary_name":"fb-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"firewire-core-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"floppy-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"fs-core-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"fs-core-modules-4.15.0-55-generic-lpae-di"},{"binary_version":"4.15.0-55.60","binary_name":"fs-secondary-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"fs-secondary-modules-4.15.0-55-generic-lpae-di"},{"binary_version":"4.15.0-55.60","binary_name":"input-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"input-modules-4.15.0-55-generic-lpae-di"},{"binary_version":"4.15.0-55.60","binary_name":"ipmi-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"ipmi-modules-4.15.0-55-generic-lpae-di"},{"binary_version":"4.15.0-55.60","binary_name":"irda-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"irda-modules-4.15.0-55-generic-lpae-di"},{"binary_version":"4.15.0-55.60","binary_name":"kernel-image-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"kernel-image-4.15.0-55-generic-lpae-di"},{"binary_version":"4.15.0-55.60","binary_name":"linux-buildinfo-4.15.0-55-generic"},{"binary_version":"4.15.0-55.60","binary_name":"linux-buildinfo-4.15.0-55-generic-lpae"},{"binary_version":"4.15.0-55.60","binary_name":"linux-buildinfo-4.15.0-55-lowlatency"},{"binary_version":"4.15.0-55.60","binary_name":"linux-cloud-tools-4.15.0-55"},{"binary_version":"4.15.0-55.60","binary_name":"linux-cloud-tools-4.15.0-55-generic"},{"binary_version":"4.15.0-55.60","binary_name":"linux-cloud-tools-4.15.0-55-lowlatency"},{"binary_version":"4.15.0-55.60","binary_name":"linux-cloud-tools-common"},{"binary_version":"4.15.0-55.60","binary_name":"linux-headers-4.15.0-55"},{"binary_version":"4.15.0-55.60","binary_name":"linux-headers-4.15.0-55-generic"},{"binary_version":"4.15.0-55.60","binary_name":"linux-headers-4.15.0-55-generic-lpae"},{"binary_version":"4.15.0-55.60","binary_name":"linux-headers-4.15.0-55-lowlatency"},{"binary_version":"4.15.0-55.60","binary_name":"linux-image-4.15.0-55-generic"},{"binary_version":"4.15.0-55.60","binary_name":"linux-image-4.15.0-55-generic-lpae"},{"binary_version":"4.15.0-55.60","binary_name":"linux-image-4.15.0-55-lowlatency"},{"binary_version":"4.15.0-55.60","binary_name":"linux-image-unsigned-4.15.0-55-generic"},{"binary_version":"4.15.0-55.60","binary_name":"linux-image-unsigned-4.15.0-55-lowlatency"},{"binary_version":"4.15.0-55.60","binary_name":"linux-modules-4.15.0-55-generic"},{"binary_version":"4.15.0-55.60","binary_name":"linux-modules-4.15.0-55-generic-lpae"},{"binary_version":"4.15.0-55.60","binary_name":"linux-modules-4.15.0-55-lowlatency"},{"binary_version":"4.15.0-55.60","binary_name":"linux-modules-extra-4.15.0-55-generic"},{"binary_version":"4.15.0-55.60","binary_name":"linux-source-4.15.0"},{"binary_version":"4.15.0-55.60","binary_name":"linux-tools-4.15.0-55"},{"binary_version":"4.15.0-55.60","binary_name":"linux-tools-4.15.0-55-generic"},{"binary_version":"4.15.0-55.60","binary_name":"linux-tools-4.15.0-55-generic-lpae"},{"binary_version":"4.15.0-55.60","binary_name":"linux-tools-4.15.0-55-lowlatency"},{"binary_version":"4.15.0-55.60","binary_name":"linux-tools-common"},{"binary_version":"4.15.0-55.60","binary_name":"linux-tools-host"},{"binary_version":"4.15.0-55.60","binary_name":"linux-udebs-generic"},{"binary_version":"4.15.0-55.60","binary_name":"linux-udebs-generic-lpae"},{"binary_version":"4.15.0-55.60","binary_name":"md-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"md-modules-4.15.0-55-generic-lpae-di"},{"binary_version":"4.15.0-55.60","binary_name":"message-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"mouse-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"mouse-modules-4.15.0-55-generic-lpae-di"},{"binary_version":"4.15.0-55.60","binary_name":"multipath-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"multipath-modules-4.15.0-55-generic-lpae-di"},{"binary_version":"4.15.0-55.60","binary_name":"nfs-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"nfs-modules-4.15.0-55-generic-lpae-di"},{"binary_version":"4.15.0-55.60","binary_name":"nic-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"nic-modules-4.15.0-55-generic-lpae-di"},{"binary_version":"4.15.0-55.60","binary_name":"nic-pcmcia-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"nic-shared-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"nic-shared-modules-4.15.0-55-generic-lpae-di"},{"binary_version":"4.15.0-55.60","binary_name":"nic-usb-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"nic-usb-modules-4.15.0-55-generic-lpae-di"},{"binary_version":"4.15.0-55.60","binary_name":"parport-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"parport-modules-4.15.0-55-generic-lpae-di"},{"binary_version":"4.15.0-55.60","binary_name":"pata-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"pcmcia-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"pcmcia-storage-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"plip-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"plip-modules-4.15.0-55-generic-lpae-di"},{"binary_version":"4.15.0-55.60","binary_name":"ppp-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"ppp-modules-4.15.0-55-generic-lpae-di"},{"binary_version":"4.15.0-55.60","binary_name":"sata-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"sata-modules-4.15.0-55-generic-lpae-di"},{"binary_version":"4.15.0-55.60","binary_name":"scsi-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"scsi-modules-4.15.0-55-generic-lpae-di"},{"binary_version":"4.15.0-55.60","binary_name":"serial-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"storage-core-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"storage-core-modules-4.15.0-55-generic-lpae-di"},{"binary_version":"4.15.0-55.60","binary_name":"usb-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"usb-modules-4.15.0-55-generic-lpae-di"},{"binary_version":"4.15.0-55.60","binary_name":"virtio-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"vlan-modules-4.15.0-55-generic-di"},{"binary_version":"4.15.0-55.60","binary_name":"vlan-modules-4.15.0-55-generic-lpae-di"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11085"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11815"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11833"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11884"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4068-1.json"}},{"package":{"name":"linux-aws","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-aws@4.15.0-1044.46?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1044.46"}]}],"versions":["4.15.0-1001.1","4.15.0-1003.3","4.15.0-1005.5","4.15.0-1006.6","4.15.0-1007.7","4.15.0-1009.9","4.15.0-1010.10","4.15.0-1011.11","4.15.0-1016.16","4.15.0-1017.17","4.15.0-1019.19","4.15.0-1020.20","4.15.0-1021.21","4.15.0-1023.23","4.15.0-1025.25","4.15.0-1027.27","4.15.0-1029.30","4.15.0-1031.33","4.15.0-1032.34","4.15.0-1033.35","4.15.0-1034.36","4.15.0-1035.37","4.15.0-1037.39","4.15.0-1039.41","4.15.0-1040.42","4.15.0-1041.43","4.15.0-1043.45"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.15.0-1044.46","binary_name":"linux-aws-cloud-tools-4.15.0-1044"},{"binary_version":"4.15.0-1044.46","binary_name":"linux-aws-headers-4.15.0-1044"},{"binary_version":"4.15.0-1044.46","binary_name":"linux-aws-tools-4.15.0-1044"},{"binary_version":"4.15.0-1044.46","binary_name":"linux-buildinfo-4.15.0-1044-aws"},{"binary_version":"4.15.0-1044.46","binary_name":"linux-cloud-tools-4.15.0-1044-aws"},{"binary_version":"4.15.0-1044.46","binary_name":"linux-headers-4.15.0-1044-aws"},{"binary_version":"4.15.0-1044.46","binary_name":"linux-image-4.15.0-1044-aws"},{"binary_version":"4.15.0-1044.46","binary_name":"linux-modules-4.15.0-1044-aws"},{"binary_version":"4.15.0-1044.46","binary_name":"linux-tools-4.15.0-1044-aws"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11085"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11815"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11833"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11884"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4068-1.json"}},{"package":{"name":"linux-gcp","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-gcp@4.15.0-1037.39?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1037.39"}]}],"versions":["4.15.0-1001.1","4.15.0-1003.3","4.15.0-1005.5","4.15.0-1006.6","4.15.0-1008.8","4.15.0-1009.9","4.15.0-1010.10","4.15.0-1014.14","4.15.0-1015.15","4.15.0-1017.18","4.15.0-1018.19","4.15.0-1019.20","4.15.0-1021.22","4.15.0-1023.24","4.15.0-1024.25","4.15.0-1025.26","4.15.0-1026.27","4.15.0-1027.28","4.15.0-1028.29","4.15.0-1029.31","4.15.0-1030.32","4.15.0-1032.34","4.15.0-1033.35","4.15.0-1034.36","4.15.0-1036.38"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.15.0-1037.39","binary_name":"linux-buildinfo-4.15.0-1037-gcp"},{"binary_version":"4.15.0-1037.39","binary_name":"linux-gcp-headers-4.15.0-1037"},{"binary_version":"4.15.0-1037.39","binary_name":"linux-gcp-tools-4.15.0-1037"},{"binary_version":"4.15.0-1037.39","binary_name":"linux-headers-4.15.0-1037-gcp"},{"binary_version":"4.15.0-1037.39","binary_name":"linux-image-unsigned-4.15.0-1037-gcp"},{"binary_version":"4.15.0-1037.39","binary_name":"linux-modules-4.15.0-1037-gcp"},{"binary_version":"4.15.0-1037.39","binary_name":"linux-modules-extra-4.15.0-1037-gcp"},{"binary_version":"4.15.0-1037.39","binary_name":"linux-tools-4.15.0-1037-gcp"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11085"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11815"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11833"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11884"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4068-1.json"}},{"package":{"name":"linux-kvm","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-kvm@4.15.0-1039.39?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1039.39"}]}],"versions":["4.15.0-1002.2","4.15.0-1003.3","4.15.0-1004.4","4.15.0-1006.6","4.15.0-1008.8","4.15.0-1010.10","4.15.0-1011.11","4.15.0-1012.12","4.15.0-1016.16","4.15.0-1017.17","4.15.0-1019.19","4.15.0-1020.20","4.15.0-1021.21","4.15.0-1023.23","4.15.0-1025.25","4.15.0-1026.26","4.15.0-1027.27","4.15.0-1028.28","4.15.0-1029.29","4.15.0-1030.30","4.15.0-1031.31","4.15.0-1032.32","4.15.0-1034.34","4.15.0-1035.35","4.15.0-1036.36","4.15.0-1038.38"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.15.0-1039.39","binary_name":"linux-buildinfo-4.15.0-1039-kvm"},{"binary_version":"4.15.0-1039.39","binary_name":"linux-headers-4.15.0-1039-kvm"},{"binary_version":"4.15.0-1039.39","binary_name":"linux-image-4.15.0-1039-kvm"},{"binary_version":"4.15.0-1039.39","binary_name":"linux-kvm-headers-4.15.0-1039"},{"binary_version":"4.15.0-1039.39","binary_name":"linux-kvm-tools-4.15.0-1039"},{"binary_version":"4.15.0-1039.39","binary_name":"linux-modules-4.15.0-1039-kvm"},{"binary_version":"4.15.0-1039.39","binary_name":"linux-tools-4.15.0-1039-kvm"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11085"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11815"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11833"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11884"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4068-1.json"}},{"package":{"name":"linux-oracle","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-oracle@4.15.0-1018.20?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1018.20"}]}],"versions":["4.15.0-1007.9","4.15.0-1008.10","4.15.0-1009.11","4.15.0-1010.12","4.15.0-1011.13","4.15.0-1013.15","4.15.0-1014.16","4.15.0-1015.17","4.15.0-1017.19"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.15.0-1018.20","binary_name":"linux-buildinfo-4.15.0-1018-oracle"},{"binary_version":"4.15.0-1018.20","binary_name":"linux-headers-4.15.0-1018-oracle"},{"binary_version":"4.15.0-1018.20","binary_name":"linux-image-unsigned-4.15.0-1018-oracle"},{"binary_version":"4.15.0-1018.20","binary_name":"linux-modules-4.15.0-1018-oracle"},{"binary_version":"4.15.0-1018.20","binary_name":"linux-modules-extra-4.15.0-1018-oracle"},{"binary_version":"4.15.0-1018.20","binary_name":"linux-oracle-headers-4.15.0-1018"},{"binary_version":"4.15.0-1018.20","binary_name":"linux-oracle-tools-4.15.0-1018"},{"binary_version":"4.15.0-1018.20","binary_name":"linux-tools-4.15.0-1018-oracle"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11085"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11815"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11833"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11884"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4068-1.json"}},{"package":{"name":"linux-raspi2","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-raspi2@4.15.0-1041.44?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1041.44"}]}],"versions":["4.13.0-1005.5","4.13.0-1006.6","4.13.0-1008.8","4.15.0-1006.7","4.15.0-1009.10","4.15.0-1010.11","4.15.0-1011.12","4.15.0-1012.13","4.15.0-1013.14","4.15.0-1017.18","4.15.0-1018.19","4.15.0-1020.22","4.15.0-1021.23","4.15.0-1022.24","4.15.0-1024.26","4.15.0-1026.28","4.15.0-1027.29","4.15.0-1028.30","4.15.0-1029.31","4.15.0-1030.32","4.15.0-1031.33","4.15.0-1032.34","4.15.0-1033.35","4.15.0-1034.36","4.15.0-1036.38","4.15.0-1037.39","4.15.0-1038.40","4.15.0-1040.43"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.15.0-1041.44","binary_name":"linux-buildinfo-4.15.0-1041-raspi2"},{"binary_version":"4.15.0-1041.44","binary_name":"linux-headers-4.15.0-1041-raspi2"},{"binary_version":"4.15.0-1041.44","binary_name":"linux-image-4.15.0-1041-raspi2"},{"binary_version":"4.15.0-1041.44","binary_name":"linux-modules-4.15.0-1041-raspi2"},{"binary_version":"4.15.0-1041.44","binary_name":"linux-raspi2-headers-4.15.0-1041"},{"binary_version":"4.15.0-1041.44","binary_name":"linux-raspi2-tools-4.15.0-1041"},{"binary_version":"4.15.0-1041.44","binary_name":"linux-tools-4.15.0-1041-raspi2"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11085"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11815"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11833"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11884"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4068-1.json"}},{"package":{"name":"linux-snapdragon","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-snapdragon@4.15.0-1058.64?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1058.64"}]}],"versions":["4.4.0-1077.82","4.4.0-1078.83","4.4.0-1079.84","4.4.0-1081.86","4.15.0-1053.57","4.15.0-1054.58","4.15.0-1055.59","4.15.0-1057.62"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.15.0-1058.64","binary_name":"linux-buildinfo-4.15.0-1058-snapdragon"},{"binary_version":"4.15.0-1058.64","binary_name":"linux-headers-4.15.0-1058-snapdragon"},{"binary_version":"4.15.0-1058.64","binary_name":"linux-image-4.15.0-1058-snapdragon"},{"binary_version":"4.15.0-1058.64","binary_name":"linux-modules-4.15.0-1058-snapdragon"},{"binary_version":"4.15.0-1058.64","binary_name":"linux-snapdragon-headers-4.15.0-1058"},{"binary_version":"4.15.0-1058.64","binary_name":"linux-snapdragon-tools-4.15.0-1058"},{"binary_version":"4.15.0-1058.64","binary_name":"linux-tools-4.15.0-1058-snapdragon"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11085"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11815"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11833"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-11884"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4068-1.json"}}],"schema_version":"1.7.5"}