{"id":"USN-4157-2","summary":"linux-hwe, linux-azure, linux-gcp, linux-gke-5.0 vulnerabilities","details":"USN-4157-1 fixed vulnerabilities in the Linux kernel for Ubuntu 19.04.\nThis update provides the corresponding updates for the Linux\nHardware Enablement (HWE) kernel from Ubuntu 19.04 for Ubuntu\n18.04 LTS.\n\nWen Huang discovered that the Marvell Wi-Fi device driver in the Linux\nkernel did not properly perform bounds checking, leading to a heap\noverflow. A local attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2019-14814,\nCVE-2019-14815, CVE-2019-14816)\n\nMatt Delco discovered that the KVM hypervisor implementation in the Linux\nkernel did not properly perform bounds checking when handling coalesced\nMMIO write operations. A local attacker with write access to /dev/kvm could\nuse this to cause a denial of service (system crash). (CVE-2019-14821)\n\nHui Peng and Mathias Payer discovered that the 91x Wi-Fi driver in the\nLinux kernel did not properly handle error conditions on initialization,\nleading to a double-free vulnerability. A physically proximate attacker\ncould use this to cause a denial of service (system crash).\n(CVE-2019-15504)\n\nIt was discovered that the Technisat DVB-S/S2 USB device driver in the\nLinux kernel contained a buffer overread. A physically proximate attacker\ncould use this to cause a denial of service (system crash) or possibly\nexpose sensitive information. (CVE-2019-15505)\n\nBrad Spengler discovered that a Spectre mitigation was improperly\nimplemented in the ptrace susbsystem of the Linux kernel. A local attacker\ncould possibly use this to expose sensitive information. (CVE-2019-15902)\n\nIt was discovered that the IPv6 RDS implementation in the Linux kernel did\nnot properly initialize fields in a data structure returned to user space.\nA local attacker could use this to expose sensitive information (kernel\nmemory). Please note that the RDS protocol is disabled via blocklist in\nUbuntu by default. (CVE-2019-16714)\n\nIt was discovered that an integer overflow existed in the Binder\nimplementation of the Linux kernel, leading to a buffer overflow. A local\nattacker could use this to escalate privileges. (CVE-2019-2181)\n","modified":"2026-04-27T15:33:06.945502861Z","published":"2019-10-22T02:37:11Z","related":["UBUNTU-CVE-2019-14814","UBUNTU-CVE-2019-14815","UBUNTU-CVE-2019-14816","UBUNTU-CVE-2019-14821","UBUNTU-CVE-2019-15504","UBUNTU-CVE-2019-15505","UBUNTU-CVE-2019-15902","UBUNTU-CVE-2019-16714","UBUNTU-CVE-2019-2181"],"upstream":["CVE-2019-14814","CVE-2019-14815","CVE-2019-14816","CVE-2019-14821","CVE-2019-15504","CVE-2019-15505","CVE-2019-15902","CVE-2019-16714","CVE-2019-2181","UBUNTU-CVE-2019-14814","UBUNTU-CVE-2019-14815","UBUNTU-CVE-2019-14816","UBUNTU-CVE-2019-14821","UBUNTU-CVE-2019-15504","UBUNTU-CVE-2019-15505","UBUNTU-CVE-2019-15902","UBUNTU-CVE-2019-16714","UBUNTU-CVE-2019-2181"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4157-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-2181"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-14814"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-14815"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-14816"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-14821"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-15504"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-15505"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-15902"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-16714"}],"affected":[{"package":{"name":"linux-azure","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-azure@5.0.0-1023.24~18.04.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.0.0-1023.24~18.04.1"}]}],"versions":["4.15.0-1002.2","4.15.0-1003.3","4.15.0-1004.4","4.15.0-1008.8","4.15.0-1009.9","4.15.0-1012.12","4.15.0-1013.13","4.15.0-1014.14","4.15.0-1018.18","4.15.0-1019.19","4.15.0-1021.21","4.15.0-1022.23","4.15.0-1023.24","4.15.0-1025.26","4.15.0-1028.29","4.15.0-1030.31","4.15.0-1031.32","4.15.0-1032.33","4.15.0-1035.36","4.15.0-1036.38","4.15.0-1037.39","4.18.0-1011.11~18.04.1","4.18.0-1013.13~18.04.1","4.18.0-1014.14~18.04.1","4.18.0-1018.18~18.04.1","4.18.0-1019.19~18.04.1","4.18.0-1020.20~18.04.1","4.18.0-1023.24~18.04.1","4.18.0-1024.25~18.04.1","4.18.0-1025.27~18.04.1","5.0.0-1014.14~18.04.1","5.0.0-1016.17~18.04.1","5.0.0-1018.19~18.04.1","5.0.0-1020.21~18.04.1","5.0.0-1022.23~18.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.0.0-1023.24~18.04.1","binary_name":"linux-azure-cloud-tools-5.0.0-1023"},{"binary_version":"5.0.0-1023.24~18.04.1","binary_name":"linux-azure-headers-5.0.0-1023"},{"binary_version":"5.0.0-1023.24~18.04.1","binary_name":"linux-azure-tools-5.0.0-1023"},{"binary_version":"5.0.0-1023.24~18.04.1","binary_name":"linux-buildinfo-5.0.0-1023-azure"},{"binary_version":"5.0.0-1023.24~18.04.1","binary_name":"linux-cloud-tools-5.0.0-1023-azure"},{"binary_version":"5.0.0-1023.24~18.04.1","binary_name":"linux-headers-5.0.0-1023-azure"},{"binary_version":"5.0.0-1023.24~18.04.1","binary_name":"linux-image-unsigned-5.0.0-1023-azure"},{"binary_version":"5.0.0-1023.24~18.04.1","binary_name":"linux-modules-5.0.0-1023-azure"},{"binary_version":"5.0.0-1023.24~18.04.1","binary_name":"linux-modules-extra-5.0.0-1023-azure"},{"binary_version":"5.0.0-1023.24~18.04.1","binary_name":"linux-tools-5.0.0-1023-azure"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2181"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-14814"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-14815"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-14816"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-14821"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2019-15504"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2019-15505"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-15902"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2019-16714"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4157-2.json"}},{"package":{"name":"linux-gcp","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-gcp@5.0.0-1021.21~18.04.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.0.0-1021.21~18.04.1"}]}],"versions":["4.15.0-1001.1","4.15.0-1003.3","4.15.0-1005.5","4.15.0-1006.6","4.15.0-1008.8","4.15.0-1009.9","4.15.0-1010.10","4.15.0-1014.14","4.15.0-1015.15","4.15.0-1017.18","4.15.0-1018.19","4.15.0-1019.20","4.15.0-1021.22","4.15.0-1023.24","4.15.0-1024.25","4.15.0-1025.26","4.15.0-1026.27","4.15.0-1027.28","4.15.0-1028.29","4.15.0-1029.31","4.15.0-1030.32","4.15.0-1032.34","4.15.0-1033.35","4.15.0-1034.36","4.15.0-1036.38","4.15.0-1037.39","4.15.0-1040.42","4.15.0-1042.45","4.15.0-1044.70","5.0.0-1020.20~18.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.0.0-1021.21~18.04.1","binary_name":"linux-buildinfo-5.0.0-1021-gcp"},{"binary_version":"5.0.0-1021.21~18.04.1","binary_name":"linux-gcp-headers-5.0.0-1021"},{"binary_version":"5.0.0-1021.21~18.04.1","binary_name":"linux-gcp-tools-5.0.0-1021"},{"binary_version":"5.0.0-1021.21~18.04.1","binary_name":"linux-headers-5.0.0-1021-gcp"},{"binary_version":"5.0.0-1021.21~18.04.1","binary_name":"linux-image-unsigned-5.0.0-1021-gcp"},{"binary_name":"linux-modules-5.0.0-1021-gcp","binary_version":"5.0.0-1021.21~18.04.1"},{"binary_version":"5.0.0-1021.21~18.04.1","binary_name":"linux-modules-extra-5.0.0-1021-gcp"},{"binary_version":"5.0.0-1021.21~18.04.1","binary_name":"linux-tools-5.0.0-1021-gcp"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2181"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-14814"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-14815"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-14816"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-14821"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2019-15504"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2019-15505"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-15902"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2019-16714"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4157-2.json"}},{"package":{"name":"linux-gke-5.0","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-gke-5.0@5.0.0-1023.23~18.04.2?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.0.0-1023.23~18.04.2"}]}],"versions":["5.0.0-1011.11~18.04.1","5.0.0-1013.13~18.04.1","5.0.0-1015.15~18.04.1","5.0.0-1017.17~18.04.1","5.0.0-1020.20~18.04.1","5.0.0-1022.22~18.04.3"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"5.0.0-1023.23~18.04.2","binary_name":"linux-buildinfo-5.0.0-1023-gke"},{"binary_version":"5.0.0-1023.23~18.04.2","binary_name":"linux-gke-5.0-headers-5.0.0-1023"},{"binary_version":"5.0.0-1023.23~18.04.2","binary_name":"linux-gke-5.0-tools-5.0.0-1023"},{"binary_version":"5.0.0-1023.23~18.04.2","binary_name":"linux-headers-5.0.0-1023-gke"},{"binary_version":"5.0.0-1023.23~18.04.2","binary_name":"linux-image-unsigned-5.0.0-1023-gke"},{"binary_version":"5.0.0-1023.23~18.04.2","binary_name":"linux-modules-5.0.0-1023-gke"},{"binary_version":"5.0.0-1023.23~18.04.2","binary_name":"linux-modules-extra-5.0.0-1023-gke"},{"binary_version":"5.0.0-1023.23~18.04.2","binary_name":"linux-tools-5.0.0-1023-gke"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2181"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-14814"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-14815"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-14816"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-14821"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2019-15504"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2019-15505"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-15902"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2019-16714"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4157-2.json"}},{"package":{"name":"linux-hwe","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-hwe@5.0.0-32.34~18.04.2?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.0.0-32.34~18.04.2"}]}],"versions":["4.18.0-13.14~18.04.1","4.18.0-14.15~18.04.1","4.18.0-15.16~18.04.1","4.18.0-16.17~18.04.1","4.18.0-17.18~18.04.1","4.18.0-18.19~18.04.1","4.18.0-20.21~18.04.1","4.18.0-21.22~18.04.1","4.18.0-22.23~18.04.1","4.18.0-24.25~18.04.1","4.18.0-25.26~18.04.1","5.0.0-23.24~18.04.1","5.0.0-25.26~18.04.1","5.0.0-27.28~18.04.1","5.0.0-29.31~18.04.1","5.0.0-31.33~18.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"block-modules-5.0.0-32-generic-di","binary_version":"5.0.0-32.34~18.04.2"},{"binary_name":"block-modules-5.0.0-32-generic-lpae-di","binary_version":"5.0.0-32.34~18.04.2"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"crypto-modules-5.0.0-32-generic-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"crypto-modules-5.0.0-32-generic-lpae-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"dasd-extra-modules-5.0.0-32-generic-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"dasd-modules-5.0.0-32-generic-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"fat-modules-5.0.0-32-generic-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"fat-modules-5.0.0-32-generic-lpae-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"fb-modules-5.0.0-32-generic-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"firewire-core-modules-5.0.0-32-generic-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"floppy-modules-5.0.0-32-generic-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"fs-core-modules-5.0.0-32-generic-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"fs-core-modules-5.0.0-32-generic-lpae-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"fs-secondary-modules-5.0.0-32-generic-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"fs-secondary-modules-5.0.0-32-generic-lpae-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"input-modules-5.0.0-32-generic-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"input-modules-5.0.0-32-generic-lpae-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"ipmi-modules-5.0.0-32-generic-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"ipmi-modules-5.0.0-32-generic-lpae-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"kernel-image-5.0.0-32-generic-di"},{"binary_name":"kernel-image-5.0.0-32-generic-lpae-di","binary_version":"5.0.0-32.34~18.04.2"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"linux-buildinfo-5.0.0-32-generic"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"linux-buildinfo-5.0.0-32-generic-lpae"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"linux-buildinfo-5.0.0-32-lowlatency"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"linux-cloud-tools-5.0.0-32-generic"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"linux-cloud-tools-5.0.0-32-lowlatency"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"linux-headers-5.0.0-32"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"linux-headers-5.0.0-32-generic"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"linux-headers-5.0.0-32-generic-lpae"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"linux-headers-5.0.0-32-lowlatency"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"linux-hwe-cloud-tools-5.0.0-32"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"linux-hwe-tools-5.0.0-32"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"linux-hwe-udebs-generic"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"linux-hwe-udebs-generic-lpae"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"linux-image-5.0.0-32-generic"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"linux-image-5.0.0-32-generic-lpae"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"linux-image-5.0.0-32-lowlatency"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"linux-image-unsigned-5.0.0-32-generic"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"linux-image-unsigned-5.0.0-32-lowlatency"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"linux-modules-5.0.0-32-generic"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"linux-modules-5.0.0-32-generic-lpae"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"linux-modules-5.0.0-32-lowlatency"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"linux-modules-extra-5.0.0-32-generic"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"linux-source-5.0.0"},{"binary_name":"linux-tools-5.0.0-32-generic","binary_version":"5.0.0-32.34~18.04.2"},{"binary_name":"linux-tools-5.0.0-32-generic-lpae","binary_version":"5.0.0-32.34~18.04.2"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"linux-tools-5.0.0-32-lowlatency"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"md-modules-5.0.0-32-generic-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"md-modules-5.0.0-32-generic-lpae-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"message-modules-5.0.0-32-generic-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"mouse-modules-5.0.0-32-generic-di"},{"binary_name":"mouse-modules-5.0.0-32-generic-lpae-di","binary_version":"5.0.0-32.34~18.04.2"},{"binary_name":"multipath-modules-5.0.0-32-generic-di","binary_version":"5.0.0-32.34~18.04.2"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"multipath-modules-5.0.0-32-generic-lpae-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"nfs-modules-5.0.0-32-generic-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"nfs-modules-5.0.0-32-generic-lpae-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"nic-modules-5.0.0-32-generic-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"nic-modules-5.0.0-32-generic-lpae-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"nic-pcmcia-modules-5.0.0-32-generic-di"},{"binary_name":"nic-shared-modules-5.0.0-32-generic-di","binary_version":"5.0.0-32.34~18.04.2"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"nic-shared-modules-5.0.0-32-generic-lpae-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"nic-usb-modules-5.0.0-32-generic-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"nic-usb-modules-5.0.0-32-generic-lpae-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"parport-modules-5.0.0-32-generic-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"parport-modules-5.0.0-32-generic-lpae-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"pata-modules-5.0.0-32-generic-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"pcmcia-modules-5.0.0-32-generic-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"pcmcia-storage-modules-5.0.0-32-generic-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"plip-modules-5.0.0-32-generic-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"plip-modules-5.0.0-32-generic-lpae-di"},{"binary_name":"ppp-modules-5.0.0-32-generic-di","binary_version":"5.0.0-32.34~18.04.2"},{"binary_name":"ppp-modules-5.0.0-32-generic-lpae-di","binary_version":"5.0.0-32.34~18.04.2"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"sata-modules-5.0.0-32-generic-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"sata-modules-5.0.0-32-generic-lpae-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"scsi-modules-5.0.0-32-generic-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"scsi-modules-5.0.0-32-generic-lpae-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"serial-modules-5.0.0-32-generic-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"storage-core-modules-5.0.0-32-generic-di"},{"binary_name":"storage-core-modules-5.0.0-32-generic-lpae-di","binary_version":"5.0.0-32.34~18.04.2"},{"binary_name":"usb-modules-5.0.0-32-generic-di","binary_version":"5.0.0-32.34~18.04.2"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"usb-modules-5.0.0-32-generic-lpae-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"virtio-modules-5.0.0-32-generic-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"vlan-modules-5.0.0-32-generic-di"},{"binary_version":"5.0.0-32.34~18.04.2","binary_name":"vlan-modules-5.0.0-32-generic-lpae-di"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4157-2.json","cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-2181"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-14814"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-14815"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-14816"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-14821"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2019-15504"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2019-15505"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2019-15902"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2019-16714"}]}}}],"schema_version":"1.7.5"}