{"id":"USN-6095-1","summary":"linux-gcp, linux-hwe, linux-raspi2, linux-snapdragon vulnerabilities","details":"\nJordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did\nnot properly implement speculative execution barriers in usercopy functions\nin certain situations. A local attacker could use this to expose sensitive\ninformation (kernel memory). (CVE-2023-0459)\n\nXingyuan Mo discovered that the x86 KVM implementation in the Linux kernel\ndid not properly initialize some data structures. A local attacker could\nuse this to expose sensitive information (kernel memory). (CVE-2023-1513)\n\nIt was discovered that a use-after-free vulnerability existed in the iSCSI\nTCP implementation in the Linux kernel. A local attacker could possibly use\nthis to cause a denial of service (system crash). (CVE-2023-2162)\n\nIt was discovered that the NET/ROM protocol implementation in the Linux\nkernel contained a race condition in some situations, leading to a use-\nafter-free vulnerability. A local attacker could use this to cause a denial\nof service (system crash) or possibly execute arbitrary code.\n(CVE-2023-32269)\n\nDuoming Zhou discovered that a race condition existed in the infrared\nreceiver/transceiver driver in the Linux kernel, leading to a use-after-\nfree vulnerability. A privileged attacker could use this to cause a denial\nof service (system crash) or possibly execute arbitrary code.\n(CVE-2023-1118)\n\n","modified":"2026-04-27T16:42:22.115059Z","published":"2023-05-22T19:49:33Z","related":["UBUNTU-CVE-2023-0459","UBUNTU-CVE-2023-1118","UBUNTU-CVE-2023-1513","UBUNTU-CVE-2023-2162","UBUNTU-CVE-2023-32269"],"upstream":["CVE-2023-0459","CVE-2023-1118","CVE-2023-1513","CVE-2023-2162","CVE-2023-32269","UBUNTU-CVE-2023-0459","UBUNTU-CVE-2023-1118","UBUNTU-CVE-2023-1513","UBUNTU-CVE-2023-2162","UBUNTU-CVE-2023-32269"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6095-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-0459"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1118"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-1513"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-2162"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2023-32269"}],"affected":[{"package":{"name":"linux-gcp","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/linux-gcp@4.15.0-1150.166~16.04.1?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1150.166~16.04.1"}]}],"versions":["4.10.0-1004.4","4.10.0-1006.6","4.10.0-1007.7","4.10.0-1008.8","4.10.0-1009.9","4.13.0-1002.5","4.13.0-1006.9","4.13.0-1007.10","4.13.0-1008.11","4.13.0-1011.15","4.13.0-1012.16","4.13.0-1013.17","4.13.0-1015.19","4.13.0-1017.21","4.13.0-1019.23","4.15.0-1014.14~16.04.1","4.15.0-1015.15~16.04.1","4.15.0-1017.18~16.04.1","4.15.0-1018.19~16.04.2","4.15.0-1019.20~16.04.1","4.15.0-1021.22~16.04.1","4.15.0-1023.24~16.04.1","4.15.0-1024.25~16.04.2","4.15.0-1025.26~16.04.1","4.15.0-1026.27~16.04.1","4.15.0-1027.28~16.04.1","4.15.0-1028.29~16.04.1","4.15.0-1029.31~16.04.1","4.15.0-1030.32~16.04.1","4.15.0-1032.34~16.04.1","4.15.0-1033.35~16.04.1","4.15.0-1034.36~16.04.1","4.15.0-1036.38~16.04.1","4.15.0-1037.39~16.04.1","4.15.0-1040.42~16.04.1","4.15.0-1041.43","4.15.0-1042.44","4.15.0-1044.46","4.15.0-1046.49","4.15.0-1047.50","4.15.0-1049.52","4.15.0-1050.53","4.15.0-1052.56","4.15.0-1055.59","4.15.0-1058.62","4.15.0-1060.64","4.15.0-1061.65","4.15.0-1071.81~16.04.1","4.15.0-1077.87~16.04.1","4.15.0-1078.88~16.04.1","4.15.0-1080.90~16.04.1","4.15.0-1081.92~16.04.1","4.15.0-1083.94~16.04.1","4.15.0-1084.95~16.04.1","4.15.0-1086.98~16.04.1","4.15.0-1087.100~16.04.1","4.15.0-1088.101~16.04.1","4.15.0-1090.103~16.04.1","4.15.0-1091.104~16.04.1","4.15.0-1092.105~16.04.1","4.15.0-1093.106~16.04.1","4.15.0-1094.107~16.04.1","4.15.0-1095.108~16.04.1","4.15.0-1096.109~16.04.1","4.15.0-1097.110~16.04.1","4.15.0-1098.111~16.04.1","4.15.0-1099.112~16.04.1","4.15.0-1100.113~16.04.1","4.15.0-1103.116~16.04.1","4.15.0-1106.120~16.04.1","4.15.0-1107.121~16.04.1","4.15.0-1108.122~16.04.1","4.15.0-1109.123~16.04.1","4.15.0-1110.124~16.04.1","4.15.0-1111.125~16.04.1","4.15.0-1112.126~16.04.1","4.15.0-1114.128~16.04.1","4.15.0-1115.129~16.04.1","4.15.0-1116.130~16.04.1","4.15.0-1118.132~16.04.1","4.15.0-1119.133~16.04.1","4.15.0-1120.134~16.04.1","4.15.0-1121.135~16.04.1","4.15.0-1122.136~16.04.1","4.15.0-1124.138~16.04.1","4.15.0-1127.142~16.04.1","4.15.0-1130.146~16.04.1","4.15.0-1131.147~16.04.1","4.15.0-1134.150~16.04.2","4.15.0-1135.151~16.04.2","4.15.0-1136.152~16.04.1","4.15.0-1137.153~16.04.1","4.15.0-1138.154~16.04.1","4.15.0-1141.157~16.04.2","4.15.0-1142.158~16.04.1","4.15.0-1143.159~16.04.1","4.15.0-1146.162~16.04.1","4.15.0-1147.163~16.04.1","4.15.0-1148.164~16.04.1","4.15.0-1149.165~16.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"4.15.0-1150.166~16.04.1","binary_name":"linux-buildinfo-4.15.0-1150-gcp"},{"binary_version":"4.15.0-1150.166~16.04.1","binary_name":"linux-gcp-headers-4.15.0-1150"},{"binary_version":"4.15.0-1150.166~16.04.1","binary_name":"linux-gcp-tools-4.15.0-1150"},{"binary_version":"4.15.0-1150.166~16.04.1","binary_name":"linux-headers-4.15.0-1150-gcp"},{"binary_version":"4.15.0-1150.166~16.04.1","binary_name":"linux-image-unsigned-4.15.0-1150-gcp"},{"binary_version":"4.15.0-1150.166~16.04.1","binary_name":"linux-modules-4.15.0-1150-gcp"},{"binary_version":"4.15.0-1150.166~16.04.1","binary_name":"linux-modules-extra-4.15.0-1150-gcp"},{"binary_version":"4.15.0-1150.166~16.04.1","binary_name":"linux-tools-4.15.0-1150-gcp"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-0459"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2023-1118"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2023-1513"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-2162"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-32269"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6095-1.json"}},{"package":{"name":"linux-hwe","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/linux-hwe@4.15.0-211.222~16.04.1?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-211.222~16.04.1"}]}],"versions":["4.8.0-36.36~16.04.1","4.8.0-39.42~16.04.1","4.8.0-41.44~16.04.1","4.8.0-42.45~16.04.1","4.8.0-44.47~16.04.1","4.8.0-45.48~16.04.1","4.8.0-46.49~16.04.1","4.8.0-49.52~16.04.1","4.8.0-51.54~16.04.1","4.8.0-52.55~16.04.1","4.8.0-53.56~16.04.1","4.8.0-54.57~16.04.1","4.8.0-56.61~16.04.1","4.8.0-58.63~16.04.1","4.10.0-27.30~16.04.2","4.10.0-28.32~16.04.2","4.10.0-30.34~16.04.1","4.10.0-32.36~16.04.1","4.10.0-33.37~16.04.1","4.10.0-35.39~16.04.1","4.10.0-37.41~16.04.1","4.10.0-38.42~16.04.1","4.10.0-40.44~16.04.1","4.10.0-42.46~16.04.1","4.13.0-26.29~16.04.2","4.13.0-31.34~16.04.1","4.13.0-32.35~16.04.1","4.13.0-36.40~16.04.1","4.13.0-37.42~16.04.1","4.13.0-38.43~16.04.1","4.13.0-39.44~16.04.1","4.13.0-41.46~16.04.1","4.13.0-43.48~16.04.1","4.13.0-45.50~16.04.1","4.15.0-24.26~16.04.1","4.15.0-29.31~16.04.1","4.15.0-30.32~16.04.1","4.15.0-32.35~16.04.1","4.15.0-33.36~16.04.1","4.15.0-34.37~16.04.1","4.15.0-36.39~16.04.1","4.15.0-38.41~16.04.1","4.15.0-39.42~16.04.1","4.15.0-42.45~16.04.1","4.15.0-43.46~16.04.1","4.15.0-45.48~16.04.1","4.15.0-46.49~16.04.1","4.15.0-47.50~16.04.1","4.15.0-48.51~16.04.1","4.15.0-50.54~16.04.1","4.15.0-51.55~16.04.1","4.15.0-52.56~16.04.1","4.15.0-54.58~16.04.1","4.15.0-55.60~16.04.2","4.15.0-58.64~16.04.1","4.15.0-60.67~16.04.1","4.15.0-62.69~16.04.1","4.15.0-64.73~16.04.1","4.15.0-65.74~16.04.1","4.15.0-66.75~16.04.1","4.15.0-69.78~16.04.1","4.15.0-70.79~16.04.1","4.15.0-72.81~16.04.1","4.15.0-74.83~16.04.1","4.15.0-76.86~16.04.1","4.15.0-88.88~16.04.1","4.15.0-91.92~16.04.1","4.15.0-96.97~16.04.1","4.15.0-99.100~16.04.1","4.15.0-101.102~16.04.1","4.15.0-106.107~16.04.1","4.15.0-107.108~16.04.1","4.15.0-112.113~16.04.1","4.15.0-115.116~16.04.1","4.15.0-117.118~16.04.1","4.15.0-118.119~16.04.1","4.15.0-120.122~16.04.1","4.15.0-122.124~16.04.1","4.15.0-123.126~16.04.1","4.15.0-126.129~16.04.1","4.15.0-128.131~16.04.1","4.15.0-129.132~16.04.1","4.15.0-132.136~16.04.1","4.15.0-133.137~16.04.1","4.15.0-136.140~16.04.1","4.15.0-137.141~16.04.1","4.15.0-139.143~16.04.1","4.15.0-140.144~16.04.1","4.15.0-142.146~16.04.1","4.15.0-143.147~16.04.3","4.15.0-144.148~16.04.1","4.15.0-147.151~16.04.1","4.15.0-151.157~16.04.1","4.15.0-153.160~16.04.1","4.15.0-154.161~16.04.1","4.15.0-156.163~16.04.1","4.15.0-158.166~16.04.1","4.15.0-159.167~16.04.1","4.15.0-161.169~16.04.1","4.15.0-162.170~16.04.1","4.15.0-163.171~16.04.1","4.15.0-166.174~16.04.1","4.15.0-167.175~16.04.1","4.15.0-169.177~16.04.1","4.15.0-171.180~16.04.1","4.15.0-173.182~16.04.1","4.15.0-175.184~16.04.1","4.15.0-176.185~16.04.1","4.15.0-177.186~16.04.1","4.15.0-180.189~16.04.1","4.15.0-184.194~16.04.1","4.15.0-187.198~16.04.1","4.15.0-188.199~16.04.1","4.15.0-189.200~16.04.1","4.15.0-191.202~16.04.1","4.15.0-192.203~16.04.1","4.15.0-193.204~16.04.1","4.15.0-194.205~16.04.1","4.15.0-196.207~16.04.1","4.15.0-197.208~16.04.1","4.15.0-200.211~16.04.2","4.15.0-201.212~16.04.1","4.15.0-202.213~16.04.1","4.15.0-206.217~16.04.1","4.15.0-208.219~16.04.1","4.15.0-209.220~16.04.1","4.15.0-210.221~16.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"block-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"crypto-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"dasd-extra-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"dasd-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"fat-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"fb-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"firewire-core-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"floppy-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"fs-core-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"fs-secondary-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"input-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"ipmi-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"irda-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"kernel-image-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"linux-buildinfo-4.15.0-211-generic"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"linux-buildinfo-4.15.0-211-lowlatency"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"linux-cloud-tools-4.15.0-211-generic"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"linux-cloud-tools-4.15.0-211-lowlatency"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"linux-headers-4.15.0-211"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"linux-headers-4.15.0-211-generic"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"linux-headers-4.15.0-211-lowlatency"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"linux-hwe-cloud-tools-4.15.0-211"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"linux-hwe-tools-4.15.0-211"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"linux-hwe-udebs-generic"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"linux-image-4.15.0-211-generic"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"linux-image-unsigned-4.15.0-211-generic"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"linux-image-unsigned-4.15.0-211-lowlatency"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"linux-modules-4.15.0-211-generic"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"linux-modules-4.15.0-211-lowlatency"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"linux-modules-extra-4.15.0-211-generic"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"linux-source-4.15.0"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"linux-tools-4.15.0-211-generic"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"linux-tools-4.15.0-211-lowlatency"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"md-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"message-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"mouse-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"multipath-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"nfs-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"nic-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"nic-pcmcia-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"nic-shared-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"nic-usb-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"parport-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"pata-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"pcmcia-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"pcmcia-storage-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"plip-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"ppp-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"sata-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"scsi-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"serial-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"storage-core-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"usb-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"virtio-modules-4.15.0-211-generic-di"},{"binary_version":"4.15.0-211.222~16.04.1","binary_name":"vlan-modules-4.15.0-211-generic-di"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-0459"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2023-1118"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2023-1513"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-2162"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-32269"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6095-1.json"}},{"package":{"name":"linux-raspi2","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-raspi2@4.15.0-1132.140?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1132.140"}]}],"versions":["4.13.0-1005.5","4.13.0-1006.6","4.13.0-1008.8","4.15.0-1006.7","4.15.0-1009.10","4.15.0-1010.11","4.15.0-1011.12","4.15.0-1012.13","4.15.0-1013.14","4.15.0-1017.18","4.15.0-1018.19","4.15.0-1020.22","4.15.0-1021.23","4.15.0-1022.24","4.15.0-1024.26","4.15.0-1026.28","4.15.0-1027.29","4.15.0-1028.30","4.15.0-1029.31","4.15.0-1030.32","4.15.0-1031.33","4.15.0-1032.34","4.15.0-1033.35","4.15.0-1034.36","4.15.0-1036.38","4.15.0-1037.39","4.15.0-1038.40","4.15.0-1040.43","4.15.0-1041.44","4.15.0-1043.46","4.15.0-1044.47","4.15.0-1045.49","4.15.0-1047.51","4.15.0-1048.52","4.15.0-1049.53","4.15.0-1050.54","4.15.0-1052.56","4.15.0-1053.57","4.15.0-1054.58","4.15.0-1055.59","4.15.0-1057.61","4.15.0-1060.64","4.15.0-1061.65","4.15.0-1062.66","4.15.0-1063.67","4.15.0-1065.69","4.15.0-1067.71","4.15.0-1068.72","4.15.0-1070.74","4.15.0-1071.75","4.15.0-1073.78","4.15.0-1074.79","4.15.0-1076.81","4.15.0-1077.82","4.15.0-1078.83","4.15.0-1079.84","4.15.0-1080.85","4.15.0-1081.86","4.15.0-1082.87","4.15.0-1083.88","4.15.0-1084.89","4.15.0-1085.90","4.15.0-1086.91","4.15.0-1089.94","4.15.0-1092.98","4.15.0-1093.99","4.15.0-1094.100","4.15.0-1095.101","4.15.0-1096.102","4.15.0-1097.103","4.15.0-1098.104","4.15.0-1099.106","4.15.0-1101.108","4.15.0-1102.109","4.15.0-1103.110","4.15.0-1105.112","4.15.0-1106.113","4.15.0-1107.114","4.15.0-1108.115","4.15.0-1109.116","4.15.0-1111.118","4.15.0-1114.122","4.15.0-1115.123","4.15.0-1117.125","4.15.0-1118.126","4.15.0-1119.127","4.15.0-1120.128","4.15.0-1121.129","4.15.0-1124.132","4.15.0-1125.133","4.15.0-1126.134","4.15.0-1127.135","4.15.0-1128.136","4.15.0-1129.137","4.15.0-1130.138","4.15.0-1131.139"],"ecosystem_specific":{"binaries":[{"binary_version":"4.15.0-1132.140","binary_name":"linux-buildinfo-4.15.0-1132-raspi2"},{"binary_version":"4.15.0-1132.140","binary_name":"linux-headers-4.15.0-1132-raspi2"},{"binary_version":"4.15.0-1132.140","binary_name":"linux-image-4.15.0-1132-raspi2"},{"binary_version":"4.15.0-1132.140","binary_name":"linux-modules-4.15.0-1132-raspi2"},{"binary_version":"4.15.0-1132.140","binary_name":"linux-raspi2-headers-4.15.0-1132"},{"binary_version":"4.15.0-1132.140","binary_name":"linux-raspi2-tools-4.15.0-1132"},{"binary_version":"4.15.0-1132.140","binary_name":"linux-tools-4.15.0-1132-raspi2"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-0459"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2023-1118"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2023-1513"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-2162"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-32269"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6095-1.json"}},{"package":{"name":"linux-snapdragon","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/linux-snapdragon@4.15.0-1150.160?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.15.0-1150.160"}]}],"versions":["4.4.0-1077.82","4.4.0-1078.83","4.4.0-1079.84","4.4.0-1081.86","4.15.0-1053.57","4.15.0-1054.58","4.15.0-1055.59","4.15.0-1057.62","4.15.0-1058.64","4.15.0-1060.66","4.15.0-1062.69","4.15.0-1064.71","4.15.0-1065.72","4.15.0-1066.73","4.15.0-1067.74","4.15.0-1069.76","4.15.0-1070.77","4.15.0-1071.78","4.15.0-1072.79","4.15.0-1074.81","4.15.0-1076.83","4.15.0-1077.84","4.15.0-1079.86","4.15.0-1080.87","4.15.0-1081.88","4.15.0-1083.91","4.15.0-1084.92","4.15.0-1086.94","4.15.0-1087.95","4.15.0-1089.98","4.15.0-1090.99","4.15.0-1091.100","4.15.0-1093.102","4.15.0-1094.103","4.15.0-1095.104","4.15.0-1096.105","4.15.0-1097.106","4.15.0-1098.107","4.15.0-1099.108","4.15.0-1100.109","4.15.0-1101.110","4.15.0-1102.111","4.15.0-1103.112","4.15.0-1106.115","4.15.0-1109.118","4.15.0-1110.119","4.15.0-1111.120","4.15.0-1112.121","4.15.0-1113.122","4.15.0-1114.123","4.15.0-1115.124","4.15.0-1116.125","4.15.0-1118.127","4.15.0-1119.128","4.15.0-1120.129","4.15.0-1122.131","4.15.0-1123.132","4.15.0-1125.134","4.15.0-1126.135","4.15.0-1127.136","4.15.0-1129.138","4.15.0-1132.142","4.15.0-1133.143","4.15.0-1135.145","4.15.0-1136.146","4.15.0-1137.147","4.15.0-1138.148","4.15.0-1139.149","4.15.0-1142.152","4.15.0-1143.153","4.15.0-1144.154","4.15.0-1145.155","4.15.0-1146.156","4.15.0-1148.158","4.15.0-1149.159"],"ecosystem_specific":{"binaries":[{"binary_version":"4.15.0-1150.160","binary_name":"linux-buildinfo-4.15.0-1150-snapdragon"},{"binary_version":"4.15.0-1150.160","binary_name":"linux-headers-4.15.0-1150-snapdragon"},{"binary_version":"4.15.0-1150.160","binary_name":"linux-image-4.15.0-1150-snapdragon"},{"binary_version":"4.15.0-1150.160","binary_name":"linux-modules-4.15.0-1150-snapdragon"},{"binary_version":"4.15.0-1150.160","binary_name":"linux-snapdragon-headers-4.15.0-1150"},{"binary_version":"4.15.0-1150.160","binary_name":"linux-snapdragon-tools-4.15.0-1150"},{"binary_version":"4.15.0-1150.160","binary_name":"linux-tools-4.15.0-1150-snapdragon"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:18.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-0459"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"negligible"}],"id":"CVE-2023-1118"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"type":"Ubuntu","score":"low"}],"id":"CVE-2023-1513"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-2162"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2023-32269"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6095-1.json"}}],"schema_version":"1.7.5"}