{"id":"USN-5343-1","summary":"linux, linux-aws, linux-kvm, linux-lts-xenial vulnerabilities","details":"Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the\nLinux kernel did not properly restrict access to the cgroups v1\nrelease_agent feature. A local attacker could use this to gain\nadministrative privileges. (CVE-2022-0492)\n\nIt was discovered that the aufs file system in the Linux kernel did not\nproperly restrict mount namespaces, when mounted with the non-default\nallow_userns option set. A local attacker could use this to gain\nadministrative privileges. (CVE-2016-2853)\n\nIt was discovered that the aufs file system in the Linux kernel did not\nproperly maintain POSIX ACL xattr data, when mounted with the non-default\nallow_userns option. A local attacker could possibly use this to gain\nelevated privileges. (CVE-2016-2854)\n\nIt was discovered that the f2fs file system in the Linux kernel did not\nproperly validate metadata in some situations. An attacker could use this\nto construct a malicious f2fs image that, when mounted and operated on,\ncould cause a denial of service (system crash) or possibly execute\narbitrary code. (CVE-2019-19449)\n\nIt was discovered that the XFS file system implementation in the Linux\nkernel did not properly validate meta data in some circumstances. An\nattacker could use this to construct a malicious XFS image that, when\nmounted, could cause a denial of service. (CVE-2020-12655)\n\nKiyin (尹亮) discovered that the NFC LLCP protocol implementation in the\nLinux kernel contained a reference counting error. A local attacker could\nuse this to cause a denial of service (system crash). (CVE-2020-25670)\n\nKiyin (尹亮) discovered that the NFC LLCP protocol implementation in the\nLinux kernel did not properly deallocate memory in certain error\nsituations. A local attacker could use this to cause a denial of service\n(memory exhaustion). (CVE-2020-25671, CVE-2020-25672)\n\nKiyin (尹亮) discovered that the NFC LLCP protocol implementation in the\nLinux kernel did not properly handle error conditions in some situations,\nleading to an infinite loop. A local attacker could use this to cause a\ndenial of service. (CVE-2020-25673)\n\nMathy Vanhoef discovered that the Linux kernel’s WiFi implementation\nincorrectly handled EAPOL frames from unauthenticated senders. A physically\nproximate attacker could inject malicious packets to cause a denial of\nservice (system crash). (CVE-2020-26139)\n\nMathy Vanhoef discovered that the Linux kernel’s WiFi implementation could\nreassemble mixed encrypted and plaintext fragments. A physically proximate\nattacker could possibly use this issue to inject packets or exfiltrate\nselected fragments. (CVE-2020-26147)\n\nIt was discovered that the BR/EDR pin-code pairing procedure in the Linux\nkernel was vulnerable to an impersonation attack. A physically proximate\nattacker could possibly use this to pair to a device without knowledge of\nthe pin-code. (CVE-2020-26555)\n\nIt was discovered that the bluetooth subsystem in the Linux kernel did not\nproperly perform access control. An authenticated attacker could possibly\nuse this to expose sensitive information. (CVE-2020-26558, CVE-2021-0129)\n\nIt was discovered that the FUSE user space file system implementation in\nthe Linux kernel did not properly handle bad inodes in some situations. A\nlocal attacker could possibly use this to cause a denial of service.\n(CVE-2020-36322)\n\nIt was discovered that the Infiniband RDMA userspace connection manager\nimplementation in the Linux kernel contained a race condition leading to a\nuse-after-free vulnerability. A local attacker could use this to cause a\ndenial of service (system crash) or possible execute arbitrary code.\n(CVE-2020-36385)\n\nIt was discovered that the DRM subsystem in the Linux kernel contained\ndouble-free vulnerabilities. A privileged attacker could possibly use this\nto cause a denial of service (system crash) or possibly execute arbitrary\ncode. (CVE-2021-20292)\n\nIt was discovered that a race condition existed in the timer implementation\nin the Linux kernel. A privileged attacker could use this to cause a denial\nof service. (CVE-2021-20317)\n\nOr Cohen and Nadav Markus discovered a use-after-free vulnerability in the\nnfc implementation in the Linux kernel. A privileged local attacker could\nuse this issue to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2021-23134)\n\nIt was discovered that the Xen paravirtualization backend in the Linux\nkernel did not properly deallocate memory in some situations. A local\nattacker could use this to cause a denial of service (memory exhaustion).\n(CVE-2021-28688)\n\nIt was discovered that the RPA PCI Hotplug driver implementation in the\nLinux kernel did not properly handle device name writes via sysfs, leading\nto a buffer overflow. A privileged attacker could use this to cause a\ndenial of service (system crash) or possibly execute arbitrary code.\n(CVE-2021-28972)\n\nIt was discovered that a race condition existed in the netfilter subsystem\nof the Linux kernel when replacing tables. A local attacker could use this\nto cause a denial of service (system crash). (CVE-2021-29650)\n\nIt was discovered that a race condition in the kernel Bluetooth subsystem\ncould lead to use-after-free of slab objects. An attacker could use this\nissue to possibly execute arbitrary code. (CVE-2021-32399)\n\nIt was discovered that the CIPSO implementation in the Linux kernel did not\nproperly perform reference counting in some situations, leading to use-\nafter-free vulnerabilities. An attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code. (CVE-2021-33033)\n\nIt was discovered that a use-after-free existed in the Bluetooth HCI driver\nof the Linux kernel. A local attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code. (CVE-2021-33034)\n\nAsaf Modelevsky discovered that the Intel(R) Ethernet ixgbe driver for the\nLinux kernel did not properly validate large MTU requests from Virtual\nFunction (VF) devices. A local attacker could possibly use this to cause a\ndenial of service. (CVE-2021-33098)\n\nNorbert Slusarek discovered that the CAN broadcast manger (bcm) protocol\nimplementation in the Linux kernel did not properly initialize memory in\nsome situations. A local attacker could use this to expose sensitive\ninformation (kernel memory). (CVE-2021-34693)\n\n马哲宇 discovered that the IEEE 1394 (Firewire) nosy packet sniffer driver in\nthe Linux kernel did not properly perform reference counting in some\nsituations, leading to a use-after-free vulnerability. A local attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2021-3483)\n\nIt was discovered that an out-of-bounds (OOB) memory access flaw existed in\nthe f2fs module of the Linux kernel. A local attacker could use this issue\nto cause a denial of service (system crash). (CVE-2021-3506)\n\nIt was discovered that the bluetooth subsystem in the Linux kernel did not\nproperly handle HCI device initialization failure, leading to a double-free\nvulnerability. An attacker could use this to cause a denial of service or\npossibly execute arbitrary code. (CVE-2021-3564)\n\nIt was discovered that the bluetooth subsystem in the Linux kernel did not\nproperly handle HCI device detach events, leading to a use-after-free\nvulnerability. An attacker could use this to cause a denial of service or\npossibly execute arbitrary code. (CVE-2021-3573)\n\nMurray McAllister discovered that the joystick device interface in the\nLinux kernel did not properly validate data passed via an ioctl(). A local\nattacker could use this to cause a denial of service (system crash) or\npossibly execute arbitrary code on systems with a joystick device\nregistered. (CVE-2021-3612)\n\nIt was discovered that the tracing subsystem in the Linux kernel did not\nproperly keep track of per-cpu ring buffer state. A privileged attacker\ncould use this to cause a denial of service. (CVE-2021-3679)\n\nIt was discovered that the Virtio console implementation in the Linux\nkernel did not properly validate input lengths in some situations. A local\nattacker could possibly use this to cause a denial of service (system\ncrash). (CVE-2021-38160)\n\nIt was discovered that the KVM hypervisor implementation in the Linux\nkernel did not properly compute the access permissions for shadow pages in\nsome situations. A local attacker could use this to cause a denial of\nservice. (CVE-2021-38198)\n\nIt was discovered that the MAX-3421 host USB device driver in the Linux\nkernel did not properly handle device removal events. A physically\nproximate attacker could use this to cause a denial of service (system\ncrash). (CVE-2021-38204)\n\nIt was discovered that the NFC implementation in the Linux kernel did not\nproperly handle failed connect events leading to a NULL pointer\ndereference. A local attacker could use this to cause a denial of service.\n(CVE-2021-38208)\n\nIt was discovered that the configfs interface for USB gadgets in the Linux\nkernel contained a race condition. A local attacker could possibly use this\nto expose sensitive information (kernel memory). (CVE-2021-39648)\n\nIt was discovered that the ext4 file system in the Linux kernel contained a\nrace condition when writing xattrs to an inode. A local attacker could use\nthis to cause a denial of service or possibly gain administrative\nprivileges. (CVE-2021-40490)\n\nIt was discovered that the 6pack network protocol driver in the Linux\nkernel did not properly perform validation checks. A privileged attacker\ncould use this to cause a denial of service (system crash) or execute\narbitrary code. (CVE-2021-42008)\n\nIt was discovered that the ISDN CAPI implementation in the Linux kernel\ncontained a race condition in certain situations that could trigger an\narray out-of-bounds bug. A privileged local attacker could possibly use\nthis to cause a denial of service or execute arbitrary code.\n(CVE-2021-43389)\n\nIt was discovered that the Phone Network protocol (PhoNet) implementation\nin the Linux kernel did not properly perform reference counting in some\nerror conditions. A local attacker could possibly use this to cause a\ndenial of service (memory exhaustion). (CVE-2021-45095)\n\nWenqing Liu discovered that the f2fs file system in the Linux kernel did\nnot properly validate the last xattr entry in an inode. An attacker could\nuse this to construct a malicious f2fs image that, when mounted and\noperated on, could cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2021-45469)\n\nAmit Klein discovered that the IPv6 implementation in the Linux kernel\ncould disclose internal state in some situations. An attacker could\npossibly use this to expose sensitive information. (CVE-2021-45485)\n\nIt was discovered that the per cpu memory allocator in the Linux kernel\ncould report kernel pointers via dmesg. An attacker could use this to\nexpose sensitive information or in conjunction with another kernel\nvulnerability. (CVE-2018-5995)\n","modified":"2026-02-10T04:42:32Z","published":"2022-03-22T20:05:42Z","related":["UBUNTU-CVE-2016-2853","UBUNTU-CVE-2016-2854","UBUNTU-CVE-2018-5995","UBUNTU-CVE-2019-19449","UBUNTU-CVE-2020-12655","UBUNTU-CVE-2020-25670","UBUNTU-CVE-2020-25671","UBUNTU-CVE-2020-25672","UBUNTU-CVE-2020-25673","UBUNTU-CVE-2020-26139","UBUNTU-CVE-2020-26147","UBUNTU-CVE-2020-26555","UBUNTU-CVE-2020-26558","UBUNTU-CVE-2020-36322","UBUNTU-CVE-2020-36385","UBUNTU-CVE-2021-0129","UBUNTU-CVE-2021-20292","UBUNTU-CVE-2021-20317","UBUNTU-CVE-2021-23134","UBUNTU-CVE-2021-28688","UBUNTU-CVE-2021-28972","UBUNTU-CVE-2021-29650","UBUNTU-CVE-2021-32399","UBUNTU-CVE-2021-33033","UBUNTU-CVE-2021-33034","UBUNTU-CVE-2021-33098","UBUNTU-CVE-2021-34693","UBUNTU-CVE-2021-3483","UBUNTU-CVE-2021-3506","UBUNTU-CVE-2021-3564","UBUNTU-CVE-2021-3573","UBUNTU-CVE-2021-3612","UBUNTU-CVE-2021-3679","UBUNTU-CVE-2021-38160","UBUNTU-CVE-2021-38198","UBUNTU-CVE-2021-38204","UBUNTU-CVE-2021-38208","UBUNTU-CVE-2021-39648","UBUNTU-CVE-2021-40490","UBUNTU-CVE-2021-42008","UBUNTU-CVE-2021-43389","UBUNTU-CVE-2021-45095","UBUNTU-CVE-2021-45469","UBUNTU-CVE-2021-45485","UBUNTU-CVE-2022-0492"],"upstream":["CVE-2016-2853","CVE-2016-2854","CVE-2018-5995","CVE-2019-19449","CVE-2020-12655","CVE-2020-25670","CVE-2020-25671","CVE-2020-25672","CVE-2020-25673","CVE-2020-26139","CVE-2020-26147","CVE-2020-26555","CVE-2020-26558","CVE-2020-36322","CVE-2020-36385","CVE-2021-0129","CVE-2021-20292","CVE-2021-20317","CVE-2021-23134","CVE-2021-28688","CVE-2021-28972","CVE-2021-29650","CVE-2021-32399","CVE-2021-33033","CVE-2021-33034","CVE-2021-33098","CVE-2021-34693","CVE-2021-3483","CVE-2021-3506","CVE-2021-3564","CVE-2021-3573","CVE-2021-3612","CVE-2021-3679","CVE-2021-38160","CVE-2021-38198","CVE-2021-38204","CVE-2021-38208","CVE-2021-39648","CVE-2021-40490","CVE-2021-42008","CVE-2021-43389","CVE-2021-45095","CVE-2021-45469","CVE-2021-45485","CVE-2022-0492","UBUNTU-CVE-2016-2853","UBUNTU-CVE-2016-2854","UBUNTU-CVE-2018-5995","UBUNTU-CVE-2019-19449","UBUNTU-CVE-2020-12655","UBUNTU-CVE-2020-25670","UBUNTU-CVE-2020-25671","UBUNTU-CVE-2020-25672","UBUNTU-CVE-2020-25673","UBUNTU-CVE-2020-26139","UBUNTU-CVE-2020-26147","UBUNTU-CVE-2020-26555","UBUNTU-CVE-2020-26558","UBUNTU-CVE-2020-36322","UBUNTU-CVE-2020-36385","UBUNTU-CVE-2021-0129","UBUNTU-CVE-2021-20292","UBUNTU-CVE-2021-20317","UBUNTU-CVE-2021-23134","UBUNTU-CVE-2021-28688","UBUNTU-CVE-2021-28972","UBUNTU-CVE-2021-29650","UBUNTU-CVE-2021-32399","UBUNTU-CVE-2021-33033","UBUNTU-CVE-2021-33034","UBUNTU-CVE-2021-33098","UBUNTU-CVE-2021-34693","UBUNTU-CVE-2021-3483","UBUNTU-CVE-2021-3506","UBUNTU-CVE-2021-3564","UBUNTU-CVE-2021-3573","UBUNTU-CVE-2021-3612","UBUNTU-CVE-2021-3679","UBUNTU-CVE-2021-38160","UBUNTU-CVE-2021-38198","UBUNTU-CVE-2021-38204","UBUNTU-CVE-2021-38208","UBUNTU-CVE-2021-39648","UBUNTU-CVE-2021-40490","UBUNTU-CVE-2021-42008","UBUNTU-CVE-2021-43389","UBUNTU-CVE-2021-45095","UBUNTU-CVE-2021-45469","UBUNTU-CVE-2021-45485","UBUNTU-CVE-2022-0492"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5343-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2853"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-2854"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-5995"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2019-19449"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-12655"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-25670"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-25671"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-25672"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-25673"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-26139"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-26147"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-26555"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-26558"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-36322"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-36385"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-0129"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3483"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3506"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3564"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3573"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3612"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3679"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20292"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-20317"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-23134"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-28688"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-28972"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-29650"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-32399"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-33033"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-33034"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-33098"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-34693"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-38160"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-38198"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-38204"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-38208"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-39648"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-40490"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-42008"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-43389"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-45095"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-45469"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-45485"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-0492"}],"affected":[{"package":{"name":"linux-aws","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/linux-aws@4.4.0-1102.107?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-1102.107"}]}],"versions":["4.4.0-1002.2","4.4.0-1003.3","4.4.0-1005.5","4.4.0-1006.6","4.4.0-1009.9","4.4.0-1010.10","4.4.0-1011.11","4.4.0-1012.12","4.4.0-1014.14","4.4.0-1016.16","4.4.0-1017.17","4.4.0-1019.19","4.4.0-1022.22","4.4.0-1023.23","4.4.0-1024.25","4.4.0-1025.26","4.4.0-1027.30","4.4.0-1028.31","4.4.0-1029.32","4.4.0-1031.34","4.4.0-1032.35","4.4.0-1034.37","4.4.0-1036.39","4.4.0-1037.40","4.4.0-1038.41","4.4.0-1039.42","4.4.0-1040.43","4.4.0-1042.45","4.4.0-1044.47","4.4.0-1045.48","4.4.0-1046.50","4.4.0-1048.52","4.4.0-1050.54","4.4.0-1052.56","4.4.0-1054.58","4.4.0-1055.59","4.4.0-1056.60","4.4.0-1058.62","4.4.0-1059.63","4.4.0-1060.64","4.4.0-1061.65","4.4.0-1062.66","4.4.0-1064.68","4.4.0-1065.69","4.4.0-1066.70","4.4.0-1067.71","4.4.0-1073.77","4.4.0-1074.78","4.4.0-1075.79","4.4.0-1076.80","4.4.0-1077.81","4.4.0-1078.82","4.4.0-1081.85","4.4.0-1082.86","4.4.0-1083.87","4.4.0-1085.89","4.4.0-1086.90","4.4.0-1087.91","4.4.0-1088.92","4.4.0-1090.94","4.4.0-1091.95","4.4.0-1092.96","4.4.0-1093.97","4.4.0-1094.99","4.4.0-1095.100","4.4.0-1096.101","4.4.0-1097.102","4.4.0-1098.103","4.4.0-1099.104","4.4.0-1101.106"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-aws-cloud-tools-4.4.0-1102","binary_version":"4.4.0-1102.107"},{"binary_name":"linux-aws-headers-4.4.0-1102","binary_version":"4.4.0-1102.107"},{"binary_name":"linux-aws-tools-4.4.0-1102","binary_version":"4.4.0-1102.107"},{"binary_name":"linux-buildinfo-4.4.0-1102-aws","binary_version":"4.4.0-1102.107"},{"binary_name":"linux-cloud-tools-4.4.0-1102-aws","binary_version":"4.4.0-1102.107"},{"binary_name":"linux-headers-4.4.0-1102-aws","binary_version":"4.4.0-1102.107"},{"binary_name":"linux-image-4.4.0-1102-aws","binary_version":"4.4.0-1102.107"},{"binary_name":"linux-modules-4.4.0-1102-aws","binary_version":"4.4.0-1102.107"},{"binary_name":"linux-tools-4.4.0-1102-aws","binary_version":"4.4.0-1102.107"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5343-1.json","cves_map":{"cves":[{"id":"CVE-2016-2853","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-2854","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2018-5995","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"negligible","type":"Ubuntu"}]},{"id":"CVE-2019-19449","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2020-12655","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-25670","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-25671","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-25672","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-25673","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-26139","severity":[{"score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-36322","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-36385","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-3506","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-3573","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-20292","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-20317","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-28688","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-29650","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-32399","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-33033","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-33098","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-38160","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-38198","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-38208","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-39648","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-40490","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-43389","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-45095","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-45469","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-0492","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:14.04:LTS"}}},{"package":{"name":"linux-lts-xenial","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/linux-lts-xenial@4.4.0-222.255~14.04.1?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-222.255~14.04.1"}]}],"versions":["4.4.0-13.29~14.04.1","4.4.0-14.30~14.04.2","4.4.0-15.31~14.04.1","4.4.0-18.34~14.04.1","4.4.0-21.37~14.04.1","4.4.0-22.39~14.04.1","4.4.0-22.40~14.04.1","4.4.0-24.43~14.04.1","4.4.0-28.47~14.04.1","4.4.0-31.50~14.04.1","4.4.0-34.53~14.04.1","4.4.0-36.55~14.04.1","4.4.0-38.57~14.04.1","4.4.0-42.62~14.04.1","4.4.0-45.66~14.04.1","4.4.0-47.68~14.04.1","4.4.0-51.72~14.04.1","4.4.0-53.74~14.04.1","4.4.0-57.78~14.04.1","4.4.0-59.80~14.04.1","4.4.0-62.83~14.04.1","4.4.0-63.84~14.04.2","4.4.0-64.85~14.04.1","4.4.0-66.87~14.04.1","4.4.0-67.88~14.04.1","4.4.0-70.91~14.04.1","4.4.0-71.92~14.04.1","4.4.0-72.93~14.04.1","4.4.0-75.96~14.04.1","4.4.0-78.99~14.04.2","4.4.0-79.100~14.04.1","4.4.0-81.104~14.04.1","4.4.0-83.106~14.04.1","4.4.0-87.110~14.04.1","4.4.0-89.112~14.04.1","4.4.0-91.114~14.04.1","4.4.0-92.115~14.04.1","4.4.0-93.116~14.04.1","4.4.0-96.119~14.04.1","4.4.0-97.120~14.04.1","4.4.0-98.121~14.04.1","4.4.0-101.124~14.04.1","4.4.0-103.126~14.04.1","4.4.0-104.127~14.04.1","4.4.0-108.131~14.04.1","4.4.0-109.132~14.04.1","4.4.0-111.134~14.04.1","4.4.0-112.135~14.04.1","4.4.0-116.140~14.04.1","4.4.0-119.143~14.04.1","4.4.0-121.145~14.04.1","4.4.0-124.148~14.04.1","4.4.0-127.153~14.04.1","4.4.0-128.154~14.04.1","4.4.0-130.156~14.04.1","4.4.0-131.157~14.04.1","4.4.0-133.159~14.04.1","4.4.0-134.160~14.04.1","4.4.0-135.161~14.04.1","4.4.0-137.163~14.04.1","4.4.0-138.164~14.04.1","4.4.0-139.165~14.04.1","4.4.0-140.166~14.04.1","4.4.0-141.167~14.04.1","4.4.0-142.168~14.04.1","4.4.0-143.169~14.04.2","4.4.0-144.170~14.04.1","4.4.0-146.172~14.04.1","4.4.0-148.174~14.04.1","4.4.0-150.176~14.04.1","4.4.0-151.178~14.04.1","4.4.0-154.181~14.04.1","4.4.0-157.185~14.04.1","4.4.0-159.187~14.04.1","4.4.0-161.189~14.04.1","4.4.0-164.192~14.04.1","4.4.0-165.193~14.04.1","4.4.0-166.195~14.04.1","4.4.0-168.197~14.04.1","4.4.0-169.198~14.04.1","4.4.0-170.199~14.04.1","4.4.0-171.200~14.04.1","4.4.0-173.203~14.04.1","4.4.0-174.204~14.04.1","4.4.0-176.206~14.04.1","4.4.0-177.207~14.04.1","4.4.0-178.208~14.04.1","4.4.0-179.209~14.04.1","4.4.0-184.214~14.04.1","4.4.0-185.215~14.04.1","4.4.0-186.216~14.04.1","4.4.0-187.217~14.04.1","4.4.0-189.219~14.04.1","4.4.0-190.220~14.04.1","4.4.0-193.224~14.04.1","4.4.0-194.226~14.04.1","4.4.0-197.229~14.04.1","4.4.0-198.230~14.04.1","4.4.0-200.232~14.04.1","4.4.0-201.233~14.04.1","4.4.0-203.235~14.04.1","4.4.0-204.236~14.04.1","4.4.0-206.238~14.04.1","4.4.0-208.240~14.04.1","4.4.0-209.241~14.04.1","4.4.0-210.242~14.04.1","4.4.0-211.243~14.04.1","4.4.0-212.244~14.04.1","4.4.0-213.245~14.04.1","4.4.0-214.246~14.04.1","4.4.0-215.247~14.04.1","4.4.0-218.251~14.04.1","4.4.0-219.252~14.04.1","4.4.0-221.254~14.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"block-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"crypto-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"fat-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"fb-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"firewire-core-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"floppy-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"fs-core-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"fs-secondary-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"input-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"ipmi-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"irda-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"kernel-image-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"linux-buildinfo-4.4.0-222-generic","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"linux-buildinfo-4.4.0-222-lowlatency","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"linux-cloud-tools-4.4.0-222-generic","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"linux-cloud-tools-4.4.0-222-lowlatency","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"linux-headers-4.4.0-222","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"linux-headers-4.4.0-222-generic","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"linux-headers-4.4.0-222-lowlatency","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"linux-image-4.4.0-222-generic","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"linux-image-unsigned-4.4.0-222-generic","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"linux-image-unsigned-4.4.0-222-lowlatency","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"linux-lts-xenial-cloud-tools-4.4.0-222","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"linux-lts-xenial-tools-4.4.0-222","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"linux-lts-xenial-udebs-generic","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"linux-modules-4.4.0-222-generic","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"linux-modules-4.4.0-222-lowlatency","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"linux-modules-extra-4.4.0-222-generic","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"linux-tools-4.4.0-222-generic","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"linux-tools-4.4.0-222-lowlatency","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"md-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"message-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"mouse-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"multipath-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"nfs-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"nic-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"nic-pcmcia-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"nic-shared-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"nic-usb-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"parport-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"pata-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"pcmcia-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"pcmcia-storage-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"plip-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"ppp-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"sata-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"scsi-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"serial-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"speakup-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"storage-core-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"usb-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"virtio-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"},{"binary_name":"vlan-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255~14.04.1"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5343-1.json","cves_map":{"cves":[{"id":"CVE-2016-2853","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-2854","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2018-5995","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"negligible","type":"Ubuntu"}]},{"id":"CVE-2019-19449","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2020-12655","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-25670","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-25671","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-25672","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-25673","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-26139","severity":[{"score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-36322","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-36385","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-3506","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-3573","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-20292","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-20317","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-28688","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-29650","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-32399","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-33033","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-33098","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-38160","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-38198","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-38208","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-39648","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-40490","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-43389","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-45095","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-45469","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-0492","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:14.04:LTS"}}},{"package":{"name":"linux","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/linux@4.4.0-222.255?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-222.255"}]}],"versions":["4.2.0-16.19","4.2.0-17.21","4.2.0-19.23","4.3.0-1.10","4.3.0-2.11","4.3.0-5.16","4.3.0-6.17","4.3.0-7.18","4.4.0-2.16","4.4.0-4.19","4.4.0-6.21","4.4.0-7.22","4.4.0-8.23","4.4.0-9.24","4.4.0-10.25","4.4.0-11.26","4.4.0-12.28","4.4.0-13.29","4.4.0-14.30","4.4.0-15.31","4.4.0-16.32","4.4.0-17.33","4.4.0-18.34","4.4.0-21.37","4.4.0-22.39","4.4.0-22.40","4.4.0-24.43","4.4.0-28.47","4.4.0-31.50","4.4.0-34.53","4.4.0-36.55","4.4.0-38.57","4.4.0-42.62","4.4.0-43.63","4.4.0-45.66","4.4.0-47.68","4.4.0-51.72","4.4.0-53.74","4.4.0-57.78","4.4.0-59.80","4.4.0-62.83","4.4.0-63.84","4.4.0-64.85","4.4.0-65.86","4.4.0-66.87","4.4.0-67.88","4.4.0-70.91","4.4.0-71.92","4.4.0-72.93","4.4.0-75.96","4.4.0-77.98","4.4.0-78.99","4.4.0-79.100","4.4.0-81.104","4.4.0-83.106","4.4.0-87.110","4.4.0-89.112","4.4.0-91.114","4.4.0-92.115","4.4.0-93.116","4.4.0-96.119","4.4.0-97.120","4.4.0-98.121","4.4.0-101.124","4.4.0-103.126","4.4.0-104.127","4.4.0-108.131","4.4.0-109.132","4.4.0-112.135","4.4.0-116.140","4.4.0-119.143","4.4.0-121.145","4.4.0-122.146","4.4.0-124.148","4.4.0-127.153","4.4.0-128.154","4.4.0-130.156","4.4.0-131.157","4.4.0-133.159","4.4.0-134.160","4.4.0-135.161","4.4.0-137.163","4.4.0-138.164","4.4.0-139.165","4.4.0-140.166","4.4.0-141.167","4.4.0-142.168","4.4.0-143.169","4.4.0-145.171","4.4.0-146.172","4.4.0-148.174","4.4.0-150.176","4.4.0-151.178","4.4.0-154.181","4.4.0-157.185","4.4.0-159.187","4.4.0-161.189","4.4.0-164.192","4.4.0-165.193","4.4.0-166.195","4.4.0-168.197","4.4.0-169.198","4.4.0-170.199","4.4.0-171.200","4.4.0-173.203","4.4.0-174.204","4.4.0-176.206","4.4.0-177.207","4.4.0-178.208","4.4.0-179.209","4.4.0-184.214","4.4.0-185.215","4.4.0-186.216","4.4.0-187.217","4.4.0-189.219","4.4.0-190.220","4.4.0-193.224","4.4.0-194.226","4.4.0-197.229","4.4.0-198.230","4.4.0-200.232","4.4.0-201.233","4.4.0-203.235","4.4.0-204.236","4.4.0-206.238","4.4.0-208.240","4.4.0-209.241","4.4.0-210.242","4.4.0-211.243","4.4.0-212.244","4.4.0-213.245","4.4.0-214.246","4.4.0-216.249","4.4.0-217.250","4.4.0-218.251","4.4.0-219.252","4.4.0-221.254"],"ecosystem_specific":{"binaries":[{"binary_name":"block-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"crypto-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"dasd-extra-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"dasd-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"fat-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"fb-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"firewire-core-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"floppy-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"fs-core-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"fs-secondary-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"input-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"ipmi-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"irda-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"kernel-image-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"linux-buildinfo-4.4.0-222-generic","binary_version":"4.4.0-222.255"},{"binary_name":"linux-buildinfo-4.4.0-222-lowlatency","binary_version":"4.4.0-222.255"},{"binary_name":"linux-cloud-tools-4.4.0-222","binary_version":"4.4.0-222.255"},{"binary_name":"linux-cloud-tools-4.4.0-222-generic","binary_version":"4.4.0-222.255"},{"binary_name":"linux-cloud-tools-4.4.0-222-lowlatency","binary_version":"4.4.0-222.255"},{"binary_name":"linux-cloud-tools-common","binary_version":"4.4.0-222.255"},{"binary_name":"linux-headers-4.4.0-222","binary_version":"4.4.0-222.255"},{"binary_name":"linux-headers-4.4.0-222-generic","binary_version":"4.4.0-222.255"},{"binary_name":"linux-headers-4.4.0-222-lowlatency","binary_version":"4.4.0-222.255"},{"binary_name":"linux-image-4.4.0-222-generic","binary_version":"4.4.0-222.255"},{"binary_name":"linux-image-unsigned-4.4.0-222-generic","binary_version":"4.4.0-222.255"},{"binary_name":"linux-image-unsigned-4.4.0-222-lowlatency","binary_version":"4.4.0-222.255"},{"binary_name":"linux-libc-dev","binary_version":"4.4.0-222.255"},{"binary_name":"linux-modules-4.4.0-222-generic","binary_version":"4.4.0-222.255"},{"binary_name":"linux-modules-4.4.0-222-lowlatency","binary_version":"4.4.0-222.255"},{"binary_name":"linux-modules-extra-4.4.0-222-generic","binary_version":"4.4.0-222.255"},{"binary_name":"linux-source-4.4.0","binary_version":"4.4.0-222.255"},{"binary_name":"linux-tools-4.4.0-222","binary_version":"4.4.0-222.255"},{"binary_name":"linux-tools-4.4.0-222-generic","binary_version":"4.4.0-222.255"},{"binary_name":"linux-tools-4.4.0-222-lowlatency","binary_version":"4.4.0-222.255"},{"binary_name":"linux-tools-common","binary_version":"4.4.0-222.255"},{"binary_name":"linux-tools-host","binary_version":"4.4.0-222.255"},{"binary_name":"linux-udebs-generic","binary_version":"4.4.0-222.255"},{"binary_name":"md-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"message-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"mouse-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"multipath-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"nfs-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"nic-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"nic-pcmcia-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"nic-shared-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"nic-usb-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"parport-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"pata-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"pcmcia-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"pcmcia-storage-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"plip-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"ppp-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"sata-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"scsi-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"serial-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"speakup-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"storage-core-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"usb-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"virtio-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"},{"binary_name":"vlan-modules-4.4.0-222-generic-di","binary_version":"4.4.0-222.255"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5343-1.json","cves_map":{"cves":[{"id":"CVE-2016-2853","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-2854","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2018-5995","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"negligible","type":"Ubuntu"}]},{"id":"CVE-2019-19449","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2020-12655","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-25670","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-25671","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-25672","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-25673","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-26139","severity":[{"score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-36322","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-36385","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-3506","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-3573","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-20292","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-20317","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-28688","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-29650","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-32399","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-33033","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-33098","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-38160","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-38198","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-38208","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-39648","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-40490","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-43389","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-45095","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-45469","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-0492","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:16.04:LTS"}}},{"package":{"name":"linux-aws","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/linux-aws@4.4.0-1138.152?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-1138.152"}]}],"versions":["4.4.0-1001.10","4.4.0-1003.12","4.4.0-1004.13","4.4.0-1007.16","4.4.0-1009.18","4.4.0-1011.20","4.4.0-1012.21","4.4.0-1013.22","4.4.0-1016.25","4.4.0-1017.26","4.4.0-1018.27","4.4.0-1020.29","4.4.0-1022.31","4.4.0-1026.35","4.4.0-1028.37","4.4.0-1030.39","4.4.0-1031.40","4.4.0-1032.41","4.4.0-1035.44","4.4.0-1037.46","4.4.0-1038.47","4.4.0-1039.48","4.4.0-1041.50","4.4.0-1043.52","4.4.0-1044.53","4.4.0-1047.56","4.4.0-1048.57","4.4.0-1049.58","4.4.0-1050.59","4.4.0-1052.61","4.4.0-1054.63","4.4.0-1055.64","4.4.0-1057.66","4.4.0-1060.69","4.4.0-1061.70","4.4.0-1062.71","4.4.0-1063.72","4.4.0-1065.75","4.4.0-1066.76","4.4.0-1067.77","4.4.0-1069.79","4.4.0-1070.80","4.4.0-1072.82","4.4.0-1073.83","4.4.0-1074.84","4.4.0-1075.85","4.4.0-1077.87","4.4.0-1079.89","4.4.0-1081.91","4.4.0-1083.93","4.4.0-1084.94","4.4.0-1085.96","4.4.0-1087.98","4.4.0-1088.99","4.4.0-1090.101","4.4.0-1092.103","4.4.0-1094.105","4.4.0-1095.106","4.4.0-1096.107","4.4.0-1098.109","4.4.0-1099.110","4.4.0-1100.111","4.4.0-1101.112","4.4.0-1102.113","4.4.0-1104.115","4.4.0-1105.116","4.4.0-1106.117","4.4.0-1107.118","4.4.0-1109.120","4.4.0-1110.121","4.4.0-1111.123","4.4.0-1112.124","4.4.0-1113.126","4.4.0-1114.127","4.4.0-1117.131","4.4.0-1118.132","4.4.0-1119.133","4.4.0-1121.135","4.4.0-1122.136","4.4.0-1123.137","4.4.0-1124.138","4.4.0-1126.140","4.4.0-1127.141","4.4.0-1128.142","4.4.0-1129.143","4.4.0-1130.144","4.4.0-1131.145","4.4.0-1132.146","4.4.0-1133.147","4.4.0-1134.148","4.4.0-1135.149","4.4.0-1137.151"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-aws-cloud-tools-4.4.0-1138","binary_version":"4.4.0-1138.152"},{"binary_name":"linux-aws-headers-4.4.0-1138","binary_version":"4.4.0-1138.152"},{"binary_name":"linux-aws-tools-4.4.0-1138","binary_version":"4.4.0-1138.152"},{"binary_name":"linux-buildinfo-4.4.0-1138-aws","binary_version":"4.4.0-1138.152"},{"binary_name":"linux-cloud-tools-4.4.0-1138-aws","binary_version":"4.4.0-1138.152"},{"binary_name":"linux-headers-4.4.0-1138-aws","binary_version":"4.4.0-1138.152"},{"binary_name":"linux-image-4.4.0-1138-aws","binary_version":"4.4.0-1138.152"},{"binary_name":"linux-modules-4.4.0-1138-aws","binary_version":"4.4.0-1138.152"},{"binary_name":"linux-modules-extra-4.4.0-1138-aws","binary_version":"4.4.0-1138.152"},{"binary_name":"linux-tools-4.4.0-1138-aws","binary_version":"4.4.0-1138.152"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5343-1.json","cves_map":{"cves":[{"id":"CVE-2016-2853","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-2854","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2018-5995","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"negligible","type":"Ubuntu"}]},{"id":"CVE-2019-19449","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2020-12655","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-25670","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-25671","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-25672","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-25673","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-26139","severity":[{"score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-36322","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-36385","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-3506","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-3573","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-20292","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-20317","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-28688","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-29650","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-32399","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-33033","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-33098","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-38160","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-38198","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-38208","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-39648","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-40490","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-43389","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-45095","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-45469","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-0492","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:16.04:LTS"}}},{"package":{"name":"linux-kvm","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/linux-kvm@4.4.0-1103.112?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.4.0-1103.112"}]}],"versions":["4.4.0-1004.9","4.4.0-1007.12","4.4.0-1008.13","4.4.0-1009.14","4.4.0-1010.15","4.4.0-1012.17","4.4.0-1013.18","4.4.0-1015.20","4.4.0-1017.22","4.4.0-1019.24","4.4.0-1020.25","4.4.0-1021.26","4.4.0-1023.28","4.4.0-1026.31","4.4.0-1027.32","4.4.0-1029.34","4.4.0-1031.37","4.4.0-1032.38","4.4.0-1033.39","4.4.0-1035.41","4.4.0-1036.42","4.4.0-1037.43","4.4.0-1038.44","4.4.0-1039.45","4.4.0-1040.46","4.4.0-1041.47","4.4.0-1043.49","4.4.0-1044.50","4.4.0-1046.52","4.4.0-1047.53","4.4.0-1048.55","4.4.0-1051.58","4.4.0-1052.59","4.4.0-1054.61","4.4.0-1056.63","4.4.0-1058.65","4.4.0-1059.66","4.4.0-1060.67","4.4.0-1062.69","4.4.0-1063.70","4.4.0-1064.71","4.4.0-1065.72","4.4.0-1066.73","4.4.0-1068.75","4.4.0-1069.76","4.4.0-1070.77","4.4.0-1071.78","4.4.0-1075.82","4.4.0-1076.83","4.4.0-1077.84","4.4.0-1078.85","4.4.0-1079.86","4.4.0-1080.87","4.4.0-1082.91","4.4.0-1084.93","4.4.0-1085.94","4.4.0-1087.96","4.4.0-1088.97","4.4.0-1089.98","4.4.0-1090.99","4.4.0-1091.100","4.4.0-1092.101","4.4.0-1093.102","4.4.0-1094.103","4.4.0-1095.104","4.4.0-1096.105","4.4.0-1097.106","4.4.0-1098.107","4.4.0-1099.108","4.4.0-1100.109","4.4.0-1102.111"],"ecosystem_specific":{"binaries":[{"binary_name":"linux-buildinfo-4.4.0-1103-kvm","binary_version":"4.4.0-1103.112"},{"binary_name":"linux-cloud-tools-4.4.0-1103-kvm","binary_version":"4.4.0-1103.112"},{"binary_name":"linux-headers-4.4.0-1103-kvm","binary_version":"4.4.0-1103.112"},{"binary_name":"linux-image-4.4.0-1103-kvm","binary_version":"4.4.0-1103.112"},{"binary_name":"linux-kvm-cloud-tools-4.4.0-1103","binary_version":"4.4.0-1103.112"},{"binary_name":"linux-kvm-headers-4.4.0-1103","binary_version":"4.4.0-1103.112"},{"binary_name":"linux-kvm-tools-4.4.0-1103","binary_version":"4.4.0-1103.112"},{"binary_name":"linux-modules-4.4.0-1103-kvm","binary_version":"4.4.0-1103.112"},{"binary_name":"linux-tools-4.4.0-1103-kvm","binary_version":"4.4.0-1103.112"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5343-1.json","cves_map":{"cves":[{"id":"CVE-2016-2853","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2016-2854","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2018-5995","severity":[{"score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"negligible","type":"Ubuntu"}]},{"id":"CVE-2019-19449","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2020-12655","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-25670","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-25671","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-25672","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-25673","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-26139","severity":[{"score":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-36322","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2020-36385","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-3506","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-3573","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-20292","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-20317","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-28688","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-29650","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-32399","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-33033","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-33098","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-38160","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-38198","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-38208","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-39648","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-40490","severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-43389","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-45095","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2021-45469","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]},{"id":"CVE-2022-0492","severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:16.04:LTS"}}}],"schema_version":"1.7.3"}