{"id":"USN-5984-1","summary":"linux, linux-aws, linux-dell300x, linux-kvm, linux-oracle, linux-raspi2 vulnerabilities","details":"It was discovered that the System V IPC implementation in the Linux kernel\ndid not properly handle large shared memory counts. A local attacker could\nuse this to cause a denial of service (memory exhaustion). (CVE-2021-3669)\n\nIt was discovered that a use-after-free vulnerability existed in the SGI\nGRU driver in the Linux kernel. A local attacker could possibly use this to\ncause a denial of service (system crash) or possibly execute arbitrary\ncode. (CVE-2022-3424)\n\nZiming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux\nkernel contained an out-of-bounds write vulnerability. A local attacker\ncould use this to cause a denial of service (system crash).\n(CVE-2022-36280)\n\nHyunwoo Kim discovered that the DVB Core driver in the Linux kernel did not\nproperly perform reference counting in some situations, leading to a use-\nafter-free vulnerability. A local attacker could use this to cause a denial\nof service (system crash) or possibly execute arbitrary code.\n(CVE-2022-41218)\n\nIt was discovered that the network queuing discipline implementation in the\nLinux kernel contained a null pointer dereference in some situations. A\nlocal attacker could use this to cause a denial of service (system crash).\n(CVE-2022-47929)\n\nJosé Oliveira and Rodrigo Branco discovered that the prctl syscall\nimplementation in the Linux kernel did not properly protect against\nindirect branch prediction attacks in some situations. A local attacker\ncould possibly use this to expose sensitive information. (CVE-2023-0045)\n\nIt was discovered that a use-after-free vulnerability existed in the\nAdvanced Linux Sound Architecture (ALSA) subsystem. A local attacker could\nuse this to cause a denial of service (system crash). (CVE-2023-0266)\n\nKyle Zeng discovered that the IPv6 implementation in the Linux kernel\ncontained a NULL pointer dereference vulnerability in certain situations. A\nlocal attacker could use this to cause a denial of service (system crash).\n(CVE-2023-0394)\n\nKyle Zeng discovered that the ATM VC queuing discipline implementation in\nthe Linux kernel contained a type confusion vulnerability in some\nsituations. An attacker could use this to cause a denial of service (system\ncrash). (CVE-2023-23455)\n\nIt was discovered that the RNDIS USB driver in the Linux kernel contained\nan integer overflow vulnerability. A local attacker with physical access\ncould plug in a malicious USB device to cause a denial of service (system\ncrash) or possibly execute arbitrary code. (CVE-2023-23559)\n\nWei Chen discovered that the DVB USB AZ6027 driver in the Linux kernel\ncontained a null pointer dereference when handling certain messages from\nuser space. A local attacker could use this to cause a denial of service\n(system crash). (CVE-2023-28328)\n\n","modified":"2026-04-27T16:37:16.405335Z","published":"2023-03-29T16:44:13Z","related":["UBUNTU-CVE-2021-3669","UBUNTU-CVE-2022-3424","UBUNTU-CVE-2022-36280","UBUNTU-CVE-2022-41218","UBUNTU-CVE-2022-47929","UBUNTU-CVE-2023-0045","UBUNTU-CVE-2023-0266","UBUNTU-CVE-2023-0394","UBUNTU-CVE-2023-23455","UBUNTU-CVE-2023-23559","UBUNTU-CVE-2023-28328"],"upstream":["CVE-2021-3669","CVE-2022-3424","CVE-2022-36280","CVE-2022-41218","CVE-2022-47929","CVE-2023-0045","CVE-2023-0266","CVE-2023-0394","CVE-2023-23455","CVE-2023-23559","CVE-2023-28328","UBUNTU-CVE-2021-3669","UBUNTU-CVE-2022-3424","UBUNTU-CVE-2022-36280","UBUNTU-CVE-2022-41218","UBUNTU-CVE-2022-47929","UBUNTU-CVE-2023-0045","UBUNTU-CVE-2023-0266","UBUNTU-CVE-2023-0394","UBUNTU-CVE-2023-23455","UBUNTU-CVE-2023-23559","UBUNTU-CVE-2023-28328"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5984-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3669"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-3424"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-36280"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-41218"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-47929"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-0045"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-0266"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-0394"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-23455"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-23559"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-28328"}],"affected":[{"package":{"name":"linux","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux@4.15.0-208.220?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-208.220"}]}],"versions":["4.13.0-16.19","4.13.0-17.20","4.13.0-25.29","4.13.0-32.35","4.15.0-10.11","4.15.0-12.13","4.15.0-13.14","4.15.0-15.16","4.15.0-19.20","4.15.0-20.21","4.15.0-22.24","4.15.0-23.25","4.15.0-24.26","4.15.0-29.31","4.15.0-30.32","4.15.0-32.35","4.15.0-33.36","4.15.0-34.37","4.15.0-36.39","4.15.0-38.41","4.15.0-39.42","4.15.0-42.45","4.15.0-43.46","4.15.0-44.47","4.15.0-45.48","4.15.0-46.49","4.15.0-47.50","4.15.0-48.51","4.15.0-50.54","4.15.0-51.55","4.15.0-52.56","4.15.0-54.58","4.15.0-55.60","4.15.0-58.64","4.15.0-60.67","4.15.0-62.69","4.15.0-64.73","4.15.0-65.74","4.15.0-66.75","4.15.0-69.78","4.15.0-70.79","4.15.0-72.81","4.15.0-74.84","4.15.0-76.86","4.15.0-88.88","4.15.0-91.92","4.15.0-96.97","4.15.0-99.100","4.15.0-101.102","4.15.0-106.107","4.15.0-108.109","4.15.0-109.110","4.15.0-111.112","4.15.0-112.113","4.15.0-115.116","4.15.0-117.118","4.15.0-118.119","4.15.0-121.123","4.15.0-122.124","4.15.0-123.126","4.15.0-124.127","4.15.0-126.129","4.15.0-128.131","4.15.0-129.132","4.15.0-130.134","4.15.0-132.136","4.15.0-134.138","4.15.0-135.139","4.15.0-136.140","4.15.0-137.141","4.15.0-139.143","4.15.0-140.144","4.15.0-141.145","4.15.0-142.146","4.15.0-143.147","4.15.0-144.148","4.15.0-147.151","4.15.0-151.157","4.15.0-153.160","4.15.0-154.161","4.15.0-156.163","4.15.0-158.166","4.15.0-159.167","4.15.0-161.169","4.15.0-162.170","4.15.0-163.171","4.15.0-166.174","4.15.0-167.175","4.15.0-169.177","4.15.0-171.180","4.15.0-173.182","4.15.0-175.184","4.15.0-176.185","4.15.0-177.186","4.15.0-180.189","4.15.0-184.194","4.15.0-187.198","4.15.0-188.199","4.15.0-189.200","4.15.0-191.202","4.15.0-192.203","4.15.0-193.204","4.15.0-194.205","4.15.0-196.207","4.15.0-197.208","4.15.0-200.211","4.15.0-201.212","4.15.0-202.213","4.15.0-204.215","4.15.0-206.217"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.15.0-208.220","binary_name":"block-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"block-modules-4.15.0-208-generic-lpae-di"},{"binary_version":"4.15.0-208.220","binary_name":"crypto-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"crypto-modules-4.15.0-208-generic-lpae-di"},{"binary_version":"4.15.0-208.220","binary_name":"dasd-extra-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"dasd-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"fat-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"fat-modules-4.15.0-208-generic-lpae-di"},{"binary_version":"4.15.0-208.220","binary_name":"fb-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"firewire-core-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"floppy-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"fs-core-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"fs-core-modules-4.15.0-208-generic-lpae-di"},{"binary_version":"4.15.0-208.220","binary_name":"fs-secondary-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"fs-secondary-modules-4.15.0-208-generic-lpae-di"},{"binary_version":"4.15.0-208.220","binary_name":"input-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"input-modules-4.15.0-208-generic-lpae-di"},{"binary_version":"4.15.0-208.220","binary_name":"ipmi-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"ipmi-modules-4.15.0-208-generic-lpae-di"},{"binary_version":"4.15.0-208.220","binary_name":"irda-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"irda-modules-4.15.0-208-generic-lpae-di"},{"binary_version":"4.15.0-208.220","binary_name":"kernel-image-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"kernel-image-4.15.0-208-generic-lpae-di"},{"binary_version":"4.15.0-208.220","binary_name":"linux-buildinfo-4.15.0-208-generic"},{"binary_version":"4.15.0-208.220","binary_name":"linux-buildinfo-4.15.0-208-generic-lpae"},{"binary_version":"4.15.0-208.220","binary_name":"linux-buildinfo-4.15.0-208-lowlatency"},{"binary_version":"4.15.0-208.220","binary_name":"linux-cloud-tools-4.15.0-208"},{"binary_version":"4.15.0-208.220","binary_name":"linux-cloud-tools-4.15.0-208-generic"},{"binary_version":"4.15.0-208.220","binary_name":"linux-cloud-tools-4.15.0-208-lowlatency"},{"binary_version":"4.15.0-208.220","binary_name":"linux-cloud-tools-common"},{"binary_version":"4.15.0-208.220","binary_name":"linux-headers-4.15.0-208"},{"binary_version":"4.15.0-208.220","binary_name":"linux-headers-4.15.0-208-generic"},{"binary_version":"4.15.0-208.220","binary_name":"linux-headers-4.15.0-208-generic-lpae"},{"binary_version":"4.15.0-208.220","binary_name":"linux-headers-4.15.0-208-lowlatency"},{"binary_version":"4.15.0-208.220","binary_name":"linux-image-4.15.0-208-generic"},{"binary_version":"4.15.0-208.220","binary_name":"linux-image-4.15.0-208-generic-lpae"},{"binary_version":"4.15.0-208.220","binary_name":"linux-image-4.15.0-208-lowlatency"},{"binary_version":"4.15.0-208.220","binary_name":"linux-image-unsigned-4.15.0-208-generic"},{"binary_version":"4.15.0-208.220","binary_name":"linux-image-unsigned-4.15.0-208-lowlatency"},{"binary_version":"4.15.0-208.220","binary_name":"linux-modules-4.15.0-208-generic"},{"binary_version":"4.15.0-208.220","binary_name":"linux-modules-4.15.0-208-generic-lpae"},{"binary_version":"4.15.0-208.220","binary_name":"linux-modules-4.15.0-208-lowlatency"},{"binary_version":"4.15.0-208.220","binary_name":"linux-modules-extra-4.15.0-208-generic"},{"binary_version":"4.15.0-208.220","binary_name":"linux-source-4.15.0"},{"binary_version":"4.15.0-208.220","binary_name":"linux-tools-4.15.0-208"},{"binary_version":"4.15.0-208.220","binary_name":"linux-tools-4.15.0-208-generic"},{"binary_version":"4.15.0-208.220","binary_name":"linux-tools-4.15.0-208-generic-lpae"},{"binary_version":"4.15.0-208.220","binary_name":"linux-tools-4.15.0-208-lowlatency"},{"binary_version":"4.15.0-208.220","binary_name":"linux-tools-common"},{"binary_version":"4.15.0-208.220","binary_name":"linux-tools-host"},{"binary_version":"4.15.0-208.220","binary_name":"linux-udebs-generic"},{"binary_version":"4.15.0-208.220","binary_name":"linux-udebs-generic-lpae"},{"binary_version":"4.15.0-208.220","binary_name":"md-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"md-modules-4.15.0-208-generic-lpae-di"},{"binary_version":"4.15.0-208.220","binary_name":"message-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"mouse-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"mouse-modules-4.15.0-208-generic-lpae-di"},{"binary_version":"4.15.0-208.220","binary_name":"multipath-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"multipath-modules-4.15.0-208-generic-lpae-di"},{"binary_version":"4.15.0-208.220","binary_name":"nfs-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"nfs-modules-4.15.0-208-generic-lpae-di"},{"binary_version":"4.15.0-208.220","binary_name":"nic-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"nic-modules-4.15.0-208-generic-lpae-di"},{"binary_version":"4.15.0-208.220","binary_name":"nic-pcmcia-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"nic-shared-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"nic-shared-modules-4.15.0-208-generic-lpae-di"},{"binary_version":"4.15.0-208.220","binary_name":"nic-usb-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"nic-usb-modules-4.15.0-208-generic-lpae-di"},{"binary_version":"4.15.0-208.220","binary_name":"parport-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"parport-modules-4.15.0-208-generic-lpae-di"},{"binary_version":"4.15.0-208.220","binary_name":"pata-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"pcmcia-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"pcmcia-storage-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"plip-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"plip-modules-4.15.0-208-generic-lpae-di"},{"binary_version":"4.15.0-208.220","binary_name":"ppp-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"ppp-modules-4.15.0-208-generic-lpae-di"},{"binary_version":"4.15.0-208.220","binary_name":"sata-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"sata-modules-4.15.0-208-generic-lpae-di"},{"binary_version":"4.15.0-208.220","binary_name":"scsi-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"scsi-modules-4.15.0-208-generic-lpae-di"},{"binary_version":"4.15.0-208.220","binary_name":"serial-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"storage-core-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"storage-core-modules-4.15.0-208-generic-lpae-di"},{"binary_version":"4.15.0-208.220","binary_name":"usb-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"usb-modules-4.15.0-208-generic-lpae-di"},{"binary_version":"4.15.0-208.220","binary_name":"virtio-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"vlan-modules-4.15.0-208-generic-di"},{"binary_version":"4.15.0-208.220","binary_name":"vlan-modules-4.15.0-208-generic-lpae-di"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-3669"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-3424"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-36280"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-41218"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-47929"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2023-0045"},{"severity":[{"score":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2023-0266"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-0394"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-23455"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-23559"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-28328"}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5984-1.json"}},{"package":{"name":"linux-aws","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-aws@4.15.0-1153.166?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1153.166"}]}],"versions":["4.15.0-1001.1","4.15.0-1003.3","4.15.0-1005.5","4.15.0-1006.6","4.15.0-1007.7","4.15.0-1009.9","4.15.0-1010.10","4.15.0-1011.11","4.15.0-1016.16","4.15.0-1017.17","4.15.0-1019.19","4.15.0-1020.20","4.15.0-1021.21","4.15.0-1023.23","4.15.0-1025.25","4.15.0-1027.27","4.15.0-1029.30","4.15.0-1031.33","4.15.0-1032.34","4.15.0-1033.35","4.15.0-1034.36","4.15.0-1035.37","4.15.0-1037.39","4.15.0-1039.41","4.15.0-1040.42","4.15.0-1041.43","4.15.0-1043.45","4.15.0-1044.46","4.15.0-1045.47","4.15.0-1047.49","4.15.0-1048.50","4.15.0-1050.52","4.15.0-1051.53","4.15.0-1052.54","4.15.0-1054.56","4.15.0-1056.58","4.15.0-1057.59","4.15.0-1058.60","4.15.0-1060.62","4.15.0-1063.67","4.15.0-1065.69","4.15.0-1066.70","4.15.0-1067.71","4.15.0-1073.77","4.15.0-1076.80","4.15.0-1077.81","4.15.0-1079.83","4.15.0-1080.84","4.15.0-1082.86","4.15.0-1083.87","4.15.0-1086.91","4.15.0-1087.92","4.15.0-1088.93","4.15.0-1090.95","4.15.0-1091.96","4.15.0-1092.98","4.15.0-1093.99","4.15.0-1094.101","4.15.0-1095.102","4.15.0-1096.103","4.15.0-1097.104","4.15.0-1098.105","4.15.0-1099.106","4.15.0-1101.108","4.15.0-1102.109","4.15.0-1103.110","4.15.0-1106.113","4.15.0-1109.116","4.15.0-1110.117","4.15.0-1111.118","4.15.0-1112.119","4.15.0-1114.121","4.15.0-1115.122","4.15.0-1116.123","4.15.0-1118.125","4.15.0-1119.127","4.15.0-1121.129","4.15.0-1123.132","4.15.0-1124.133","4.15.0-1126.135","4.15.0-1127.136","4.15.0-1128.137","4.15.0-1130.139","4.15.0-1133.143","4.15.0-1136.147","4.15.0-1137.148","4.15.0-1139.150","4.15.0-1140.151","4.15.0-1141.152","4.15.0-1142.154","4.15.0-1143.155","4.15.0-1144.156","4.15.0-1146.158","4.15.0-1147.159","4.15.0-1148.160","4.15.0-1150.163","4.15.0-1151.164"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.15.0-1153.166","binary_name":"linux-aws-cloud-tools-4.15.0-1153"},{"binary_version":"4.15.0-1153.166","binary_name":"linux-aws-headers-4.15.0-1153"},{"binary_version":"4.15.0-1153.166","binary_name":"linux-aws-tools-4.15.0-1153"},{"binary_version":"4.15.0-1153.166","binary_name":"linux-buildinfo-4.15.0-1153-aws"},{"binary_version":"4.15.0-1153.166","binary_name":"linux-cloud-tools-4.15.0-1153-aws"},{"binary_version":"4.15.0-1153.166","binary_name":"linux-headers-4.15.0-1153-aws"},{"binary_version":"4.15.0-1153.166","binary_name":"linux-image-unsigned-4.15.0-1153-aws"},{"binary_version":"4.15.0-1153.166","binary_name":"linux-modules-4.15.0-1153-aws"},{"binary_version":"4.15.0-1153.166","binary_name":"linux-modules-extra-4.15.0-1153-aws"},{"binary_version":"4.15.0-1153.166","binary_name":"linux-tools-4.15.0-1153-aws"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-3669"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-3424"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-36280"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-41218"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-47929"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2023-0045"},{"severity":[{"score":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2023-0266"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-0394"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-23455"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-23559"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-28328"}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5984-1.json"}},{"package":{"name":"linux-dell300x","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-dell300x@4.15.0-1062.67?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1062.67"}]}],"versions":["4.15.0-1005.8","4.15.0-1006.10","4.15.0-1007.11","4.15.0-1009.13","4.15.0-1010.14","4.15.0-1011.15","4.15.0-1012.16","4.15.0-1013.17","4.15.0-1015.19","4.15.0-1016.20","4.15.0-1017.21","4.15.0-1018.22","4.15.0-1022.26","4.15.0-1027.32","4.15.0-1028.33","4.15.0-1029.34","4.15.0-1030.35","4.15.0-1031.36","4.15.0-1033.38","4.15.0-1034.39","4.15.0-1035.40","4.15.0-1037.42","4.15.0-1038.43","4.15.0-1040.45","4.15.0-1041.46","4.15.0-1042.47","4.15.0-1047.52","4.15.0-1048.53","4.15.0-1049.54","4.15.0-1051.56","4.15.0-1052.57","4.15.0-1053.58","4.15.0-1054.59","4.15.0-1055.60","4.15.0-1057.62","4.15.0-1058.63","4.15.0-1060.65","4.15.0-1061.66"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.15.0-1062.67","binary_name":"linux-buildinfo-4.15.0-1062-dell300x"},{"binary_version":"4.15.0-1062.67","binary_name":"linux-dell300x-headers-4.15.0-1062"},{"binary_version":"4.15.0-1062.67","binary_name":"linux-dell300x-tools-4.15.0-1062"},{"binary_version":"4.15.0-1062.67","binary_name":"linux-headers-4.15.0-1062-dell300x"},{"binary_version":"4.15.0-1062.67","binary_name":"linux-image-unsigned-4.15.0-1062-dell300x"},{"binary_version":"4.15.0-1062.67","binary_name":"linux-modules-4.15.0-1062-dell300x"},{"binary_version":"4.15.0-1062.67","binary_name":"linux-tools-4.15.0-1062-dell300x"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-3669"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-3424"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-36280"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-41218"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-47929"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2023-0045"},{"severity":[{"score":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2023-0266"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-0394"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-23455"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-23559"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-28328"}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5984-1.json"}},{"package":{"name":"linux-kvm","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-kvm@4.15.0-1137.142?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1137.142"}]}],"versions":["4.15.0-1002.2","4.15.0-1003.3","4.15.0-1004.4","4.15.0-1006.6","4.15.0-1008.8","4.15.0-1010.10","4.15.0-1011.11","4.15.0-1012.12","4.15.0-1016.16","4.15.0-1017.17","4.15.0-1019.19","4.15.0-1020.20","4.15.0-1021.21","4.15.0-1023.23","4.15.0-1025.25","4.15.0-1026.26","4.15.0-1027.27","4.15.0-1028.28","4.15.0-1029.29","4.15.0-1030.30","4.15.0-1031.31","4.15.0-1032.32","4.15.0-1034.34","4.15.0-1035.35","4.15.0-1036.36","4.15.0-1038.38","4.15.0-1039.39","4.15.0-1042.42","4.15.0-1043.43","4.15.0-1044.44","4.15.0-1046.46","4.15.0-1047.47","4.15.0-1048.48","4.15.0-1050.50","4.15.0-1051.51","4.15.0-1052.52","4.15.0-1053.53","4.15.0-1056.57","4.15.0-1058.59","4.15.0-1059.60","4.15.0-1060.61","4.15.0-1067.68","4.15.0-1069.70","4.15.0-1071.72","4.15.0-1072.73","4.15.0-1074.75","4.15.0-1075.76","4.15.0-1077.79","4.15.0-1079.81","4.15.0-1081.83","4.15.0-1082.84","4.15.0-1084.86","4.15.0-1085.87","4.15.0-1086.88","4.15.0-1087.89","4.15.0-1088.90","4.15.0-1089.91","4.15.0-1090.92","4.15.0-1091.93","4.15.0-1092.94","4.15.0-1094.96","4.15.0-1097.99","4.15.0-1098.100","4.15.0-1099.101","4.15.0-1100.102","4.15.0-1101.103","4.15.0-1102.104","4.15.0-1103.105","4.15.0-1105.107","4.15.0-1106.108","4.15.0-1107.109","4.15.0-1109.112","4.15.0-1110.113","4.15.0-1112.115","4.15.0-1113.116","4.15.0-1114.117","4.15.0-1116.119","4.15.0-1119.123","4.15.0-1122.127","4.15.0-1123.128","4.15.0-1125.130","4.15.0-1126.131","4.15.0-1127.132","4.15.0-1128.133","4.15.0-1129.134","4.15.0-1132.137","4.15.0-1133.138","4.15.0-1134.139","4.15.0-1135.140","4.15.0-1136.141"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.15.0-1137.142","binary_name":"linux-buildinfo-4.15.0-1137-kvm"},{"binary_version":"4.15.0-1137.142","binary_name":"linux-headers-4.15.0-1137-kvm"},{"binary_version":"4.15.0-1137.142","binary_name":"linux-image-4.15.0-1137-kvm"},{"binary_version":"4.15.0-1137.142","binary_name":"linux-kvm-headers-4.15.0-1137"},{"binary_version":"4.15.0-1137.142","binary_name":"linux-kvm-tools-4.15.0-1137"},{"binary_version":"4.15.0-1137.142","binary_name":"linux-modules-4.15.0-1137-kvm"},{"binary_version":"4.15.0-1137.142","binary_name":"linux-tools-4.15.0-1137-kvm"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-3669"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-3424"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-36280"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-41218"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-47929"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2023-0045"},{"severity":[{"score":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2023-0266"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-0394"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-23455"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-23559"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-28328"}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5984-1.json"}},{"package":{"name":"linux-oracle","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-oracle@4.15.0-1116.127?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1116.127"}]}],"versions":["4.15.0-1007.9","4.15.0-1008.10","4.15.0-1009.11","4.15.0-1010.12","4.15.0-1011.13","4.15.0-1013.15","4.15.0-1014.16","4.15.0-1015.17","4.15.0-1017.19","4.15.0-1018.20","4.15.0-1021.23","4.15.0-1022.25","4.15.0-1023.26","4.15.0-1025.28","4.15.0-1026.29","4.15.0-1027.30","4.15.0-1029.32","4.15.0-1030.33","4.15.0-1031.34","4.15.0-1033.36","4.15.0-1035.39","4.15.0-1037.41","4.15.0-1038.42","4.15.0-1039.43","4.15.0-1045.49","4.15.0-1047.51","4.15.0-1048.52","4.15.0-1050.54","4.15.0-1051.55","4.15.0-1053.57","4.15.0-1054.58","4.15.0-1057.62","4.15.0-1058.64","4.15.0-1059.65","4.15.0-1061.67","4.15.0-1062.68","4.15.0-1063.70","4.15.0-1064.71","4.15.0-1065.73","4.15.0-1066.74","4.15.0-1067.75","4.15.0-1068.76","4.15.0-1069.77","4.15.0-1070.78","4.15.0-1071.79","4.15.0-1072.80","4.15.0-1075.83","4.15.0-1078.86","4.15.0-1079.87","4.15.0-1080.88","4.15.0-1081.89","4.15.0-1082.90","4.15.0-1083.91","4.15.0-1084.92","4.15.0-1085.93","4.15.0-1086.94","4.15.0-1087.95","4.15.0-1089.98","4.15.0-1090.99","4.15.0-1091.100","4.15.0-1092.101","4.15.0-1093.102","4.15.0-1095.104","4.15.0-1098.108","4.15.0-1101.112","4.15.0-1102.113","4.15.0-1104.115","4.15.0-1105.116","4.15.0-1106.117","4.15.0-1107.118","4.15.0-1108.119","4.15.0-1111.122","4.15.0-1112.123","4.15.0-1113.124","4.15.0-1114.125","4.15.0-1115.126"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.15.0-1116.127","binary_name":"linux-buildinfo-4.15.0-1116-oracle"},{"binary_version":"4.15.0-1116.127","binary_name":"linux-headers-4.15.0-1116-oracle"},{"binary_version":"4.15.0-1116.127","binary_name":"linux-image-unsigned-4.15.0-1116-oracle"},{"binary_version":"4.15.0-1116.127","binary_name":"linux-modules-4.15.0-1116-oracle"},{"binary_version":"4.15.0-1116.127","binary_name":"linux-modules-extra-4.15.0-1116-oracle"},{"binary_version":"4.15.0-1116.127","binary_name":"linux-oracle-headers-4.15.0-1116"},{"binary_version":"4.15.0-1116.127","binary_name":"linux-oracle-tools-4.15.0-1116"},{"binary_version":"4.15.0-1116.127","binary_name":"linux-tools-4.15.0-1116-oracle"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-3669"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-3424"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-36280"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-41218"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-47929"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2023-0045"},{"severity":[{"score":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2023-0266"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-0394"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-23455"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-23559"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-28328"}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5984-1.json"}},{"package":{"name":"linux-raspi2","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-raspi2@4.15.0-1129.137?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1129.137"}]}],"versions":["4.13.0-1005.5","4.13.0-1006.6","4.13.0-1008.8","4.15.0-1006.7","4.15.0-1009.10","4.15.0-1010.11","4.15.0-1011.12","4.15.0-1012.13","4.15.0-1013.14","4.15.0-1017.18","4.15.0-1018.19","4.15.0-1020.22","4.15.0-1021.23","4.15.0-1022.24","4.15.0-1024.26","4.15.0-1026.28","4.15.0-1027.29","4.15.0-1028.30","4.15.0-1029.31","4.15.0-1030.32","4.15.0-1031.33","4.15.0-1032.34","4.15.0-1033.35","4.15.0-1034.36","4.15.0-1036.38","4.15.0-1037.39","4.15.0-1038.40","4.15.0-1040.43","4.15.0-1041.44","4.15.0-1043.46","4.15.0-1044.47","4.15.0-1045.49","4.15.0-1047.51","4.15.0-1048.52","4.15.0-1049.53","4.15.0-1050.54","4.15.0-1052.56","4.15.0-1053.57","4.15.0-1054.58","4.15.0-1055.59","4.15.0-1057.61","4.15.0-1060.64","4.15.0-1061.65","4.15.0-1062.66","4.15.0-1063.67","4.15.0-1065.69","4.15.0-1067.71","4.15.0-1068.72","4.15.0-1070.74","4.15.0-1071.75","4.15.0-1073.78","4.15.0-1074.79","4.15.0-1076.81","4.15.0-1077.82","4.15.0-1078.83","4.15.0-1079.84","4.15.0-1080.85","4.15.0-1081.86","4.15.0-1082.87","4.15.0-1083.88","4.15.0-1084.89","4.15.0-1085.90","4.15.0-1086.91","4.15.0-1089.94","4.15.0-1092.98","4.15.0-1093.99","4.15.0-1094.100","4.15.0-1095.101","4.15.0-1096.102","4.15.0-1097.103","4.15.0-1098.104","4.15.0-1099.106","4.15.0-1101.108","4.15.0-1102.109","4.15.0-1103.110","4.15.0-1105.112","4.15.0-1106.113","4.15.0-1107.114","4.15.0-1108.115","4.15.0-1109.116","4.15.0-1111.118","4.15.0-1114.122","4.15.0-1115.123","4.15.0-1117.125","4.15.0-1118.126","4.15.0-1119.127","4.15.0-1120.128","4.15.0-1121.129","4.15.0-1124.132","4.15.0-1125.133","4.15.0-1126.134","4.15.0-1127.135","4.15.0-1128.136"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.15.0-1129.137","binary_name":"linux-buildinfo-4.15.0-1129-raspi2"},{"binary_version":"4.15.0-1129.137","binary_name":"linux-headers-4.15.0-1129-raspi2"},{"binary_version":"4.15.0-1129.137","binary_name":"linux-image-4.15.0-1129-raspi2"},{"binary_version":"4.15.0-1129.137","binary_name":"linux-modules-4.15.0-1129-raspi2"},{"binary_version":"4.15.0-1129.137","binary_name":"linux-raspi2-headers-4.15.0-1129"},{"binary_version":"4.15.0-1129.137","binary_name":"linux-raspi2-tools-4.15.0-1129"},{"binary_version":"4.15.0-1129.137","binary_name":"linux-tools-4.15.0-1129-raspi2"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-3669"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-3424"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-36280"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-41218"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-47929"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2023-0045"},{"severity":[{"score":"CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"high","type":"Ubuntu"}],"id":"CVE-2023-0266"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-0394"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-23455"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-23559"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2023-28328"}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5984-1.json"}}],"schema_version":"1.7.5"}