In the Linux kernel, the following vulnerability has been resolved: nfc: nci: add flushworkqueue to prevent uaf Our detector found a concurrent use-after-free bug when detaching an NCI device. The main reason for this bug is the unexpected scheduling between the used delayed mechanism (timer and workqueue). The race can be demonstrated below: Thread-1 Thread-2 | ncidevup() | nciopendevice() | _ncirequest(nciresetreq) | ncisendcmd | queuework(cmdwork) nciunregisterdevice() | nciclosedevice() | ... deltimersync(cmdtimer)[1] | ... | Worker ncifreedevice() | ncicmdwork() kfree(ndev)[3] | modtimer(cmdtimer)[2] In short, the cleanup routine thought that the cmdtimer has already been detached by [1] but the modtimer can re-attach the timer [2], even it is already released [3], resulting in UAF. This UAF is easy to trigger, crash trace by POC is like below [ 66.703713] ================================================================== [ 66.703974] BUG: KASAN: use-after-free in enqueuetimer+0x448/0x490 [ 66.703974] Write of size 8 at addr ffff888009fb7058 by task kworker/u4:1/33 [ 66.703974] [ 66.703974] CPU: 1 PID: 33 Comm: kworker/u4:1 Not tainted 5.18.0-rc2 #5 [ 66.703974] Workqueue: nfc2ncicmdwq ncicmdwork [ 66.703974] Call Trace: [ 66.703974] <TASK> [ 66.703974] dumpstacklvl+0x57/0x7d [ 66.703974] printreport.cold+0x5e/0x5db [ 66.703974] ? enqueuetimer+0x448/0x490 [ 66.703974] kasanreport+0xbe/0x1c0 [ 66.703974] ? enqueuetimer+0x448/0x490 [ 66.703974] enqueuetimer+0x448/0x490 [ 66.703974] _modtimer+0x5e6/0xb80 [ 66.703974] ? markheldlocks+0x9e/0xe0 [ 66.703974] ? trytodeltimersync+0xf0/0xf0 [ 66.703974] ? lockdephardirqsonprepare+0x17b/0x410 [ 66.703974] ? queueworkon+0x61/0x80 [ 66.703974] ? lockdephardirqson+0xbf/0x130 [ 66.703974] processonework+0x8bb/0x1510 [ 66.703974] ? lockdephardirqsonprepare+0x410/0x410 [ 66.703974] ? pwqdecnrinflight+0x230/0x230 [ 66.703974] ? rwlockbug.part.0+0x90/0x90 [ 66.703974] ? rawspinlockirq+0x41/0x50 [ 66.703974] workerthread+0x575/0x1190 [ 66.703974] ? processonework+0x1510/0x1510 [ 66.703974] kthread+0x2a0/0x340 [ 66.703974] ? kthreadcompleteandexit+0x20/0x20 [ 66.703974] retfromfork+0x22/0x30 [ 66.703974] </TASK> [ 66.703974] [ 66.703974] Allocated by task 267: [ 66.703974] kasansavestack+0x1e/0x40 [ 66.703974] _kasankmalloc+0x81/0xa0 [ 66.703974] nciallocatedevice+0xd3/0x390 [ 66.703974] nfcmrvlnciregisterdev+0x183/0x2c0 [ 66.703974] nfcmrvlnciuartopen+0xf2/0x1dd [ 66.703974] nciuartttyioctl+0x2c3/0x4a0 [ 66.703974] ttyioctl+0x764/0x1310 [ 66.703974] _x64sysioctl+0x122/0x190 [ 66.703974] dosyscall64+0x3b/0x90 [ 66.703974] entrySYSCALL64afterhwframe+0x44/0xae [ 66.703974] [ 66.703974] Freed by task 406: [ 66.703974] kasansavestack+0x1e/0x40 [ 66.703974] kasansettrack+0x21/0x30 [ 66.703974] kasansetfreeinfo+0x20/0x30 [ 66.703974] _kasanslabfree+0x108/0x170 [ 66.703974] kfree+0xb0/0x330 [ 66.703974] nfcmrvlnciunregisterdev+0x90/0xd0 [ 66.703974] nciuartttyclose+0xdf/0x180 [ 66.703974] ttyldisckill+0x73/0x110 [ 66.703974] ttyldischangup+0x281/0x5b0 [ 66.703974] _ttyhangup.part.0+0x431/0x890 [ 66.703974] ttyrelease+0x3a8/0xc80 [ 66.703974] _fput+0x1f0/0x8c0 [ 66.703974] taskworkrun+0xc9/0x170 [ 66.703974] exittousermodeprepare+0x194/0x1a0 [ 66.703974] syscallexittousermode+0x19/0x50 [ 66.703974] dosyscall64+0x48/0x90 [ 66.703974] entrySYSCALL64after_hwframe+0x44/0x ---truncated---
{
"binaries": [
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "block-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "block-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "crypto-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "crypto-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "dasd-extra-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "dasd-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "fat-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "fat-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "fb-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "firewire-core-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "floppy-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "fs-core-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "fs-core-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "fs-secondary-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "fs-secondary-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "input-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "input-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "ipmi-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "ipmi-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "irda-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "irda-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "kernel-image-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "kernel-image-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-cloud-tools-4.15.0-23-generic"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-cloud-tools-4.15.0-23-lowlatency"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-headers-4.15.0-23"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-headers-4.15.0-23-generic"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-headers-4.15.0-23-generic-lpae"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-headers-4.15.0-23-lowlatency"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-hwe-edge-cloud-tools-4.15.0-23"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-hwe-edge-tools-4.15.0-23"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-hwe-edge-udebs-generic"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-hwe-edge-udebs-generic-lpae"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-image-4.15.0-23-generic"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-image-4.15.0-23-generic-lpae"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-image-4.15.0-23-lowlatency"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-image-unsigned-4.15.0-23-generic"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-image-unsigned-4.15.0-23-lowlatency"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-modules-4.15.0-23-generic"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-modules-4.15.0-23-generic-lpae"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-modules-4.15.0-23-lowlatency"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-modules-extra-4.15.0-23-generic"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-source-4.15.0"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-tools-4.15.0-23-generic"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-tools-4.15.0-23-generic-lpae"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-tools-4.15.0-23-lowlatency"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "md-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "md-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "message-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "mouse-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "mouse-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "multipath-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "multipath-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "nfs-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "nfs-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "nic-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "nic-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "nic-pcmcia-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "nic-shared-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "nic-shared-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "nic-usb-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "nic-usb-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "parport-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "parport-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "pata-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "pcmcia-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "pcmcia-storage-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "plip-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "plip-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "ppp-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "ppp-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "sata-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "sata-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "scsi-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "scsi-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "serial-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "storage-core-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "storage-core-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "usb-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "usb-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "virtio-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "vlan-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "vlan-modules-4.15.0-23-generic-lpae-di"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "4.15.0-189.200",
"binary_name": "block-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "block-modules-4.15.0-189-generic-lpae-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "crypto-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "crypto-modules-4.15.0-189-generic-lpae-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "dasd-extra-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "dasd-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "fat-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "fat-modules-4.15.0-189-generic-lpae-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "fb-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "firewire-core-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "floppy-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "fs-core-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "fs-core-modules-4.15.0-189-generic-lpae-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "fs-secondary-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "fs-secondary-modules-4.15.0-189-generic-lpae-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "input-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "input-modules-4.15.0-189-generic-lpae-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "ipmi-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "ipmi-modules-4.15.0-189-generic-lpae-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "irda-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "irda-modules-4.15.0-189-generic-lpae-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "kernel-image-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "kernel-image-4.15.0-189-generic-lpae-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-buildinfo-4.15.0-189-generic"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-buildinfo-4.15.0-189-generic-lpae"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-buildinfo-4.15.0-189-lowlatency"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-cloud-tools-4.15.0-189"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-cloud-tools-4.15.0-189-generic"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-cloud-tools-4.15.0-189-lowlatency"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-cloud-tools-common"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-headers-4.15.0-189"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-headers-4.15.0-189-generic"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-headers-4.15.0-189-generic-lpae"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-headers-4.15.0-189-lowlatency"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-image-4.15.0-189-generic"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-image-4.15.0-189-generic-lpae"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-image-4.15.0-189-lowlatency"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-image-unsigned-4.15.0-189-generic"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-image-unsigned-4.15.0-189-lowlatency"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-libc-dev"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-modules-4.15.0-189-generic"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-modules-4.15.0-189-generic-lpae"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-modules-4.15.0-189-lowlatency"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-modules-extra-4.15.0-189-generic"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-source-4.15.0"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-tools-4.15.0-189"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-tools-4.15.0-189-generic"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-tools-4.15.0-189-generic-lpae"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-tools-4.15.0-189-lowlatency"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-tools-common"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-tools-host"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-udebs-generic"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "linux-udebs-generic-lpae"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "md-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "md-modules-4.15.0-189-generic-lpae-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "message-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "mouse-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "mouse-modules-4.15.0-189-generic-lpae-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "multipath-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "multipath-modules-4.15.0-189-generic-lpae-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "nfs-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "nfs-modules-4.15.0-189-generic-lpae-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "nic-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "nic-modules-4.15.0-189-generic-lpae-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "nic-pcmcia-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "nic-shared-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "nic-shared-modules-4.15.0-189-generic-lpae-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "nic-usb-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "nic-usb-modules-4.15.0-189-generic-lpae-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "parport-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "parport-modules-4.15.0-189-generic-lpae-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "pata-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "pcmcia-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "pcmcia-storage-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "plip-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "plip-modules-4.15.0-189-generic-lpae-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "ppp-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "ppp-modules-4.15.0-189-generic-lpae-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "sata-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "sata-modules-4.15.0-189-generic-lpae-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "scsi-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "scsi-modules-4.15.0-189-generic-lpae-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "serial-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "storage-core-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "storage-core-modules-4.15.0-189-generic-lpae-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "usb-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "usb-modules-4.15.0-189-generic-lpae-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "virtio-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "vlan-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200",
"binary_name": "vlan-modules-4.15.0-189-generic-lpae-di"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "4.15.0-1137.148",
"binary_name": "linux-aws-cloud-tools-4.15.0-1137"
},
{
"binary_version": "4.15.0-1137.148",
"binary_name": "linux-aws-headers-4.15.0-1137"
},
{
"binary_version": "4.15.0-1137.148",
"binary_name": "linux-aws-tools-4.15.0-1137"
},
{
"binary_version": "4.15.0-1137.148",
"binary_name": "linux-buildinfo-4.15.0-1137-aws"
},
{
"binary_version": "4.15.0-1137.148",
"binary_name": "linux-cloud-tools-4.15.0-1137-aws"
},
{
"binary_version": "4.15.0-1137.148",
"binary_name": "linux-headers-4.15.0-1137-aws"
},
{
"binary_version": "4.15.0-1137.148",
"binary_name": "linux-image-unsigned-4.15.0-1137-aws"
},
{
"binary_version": "4.15.0-1137.148",
"binary_name": "linux-modules-4.15.0-1137-aws"
},
{
"binary_version": "4.15.0-1137.148",
"binary_name": "linux-modules-extra-4.15.0-1137-aws"
},
{
"binary_version": "4.15.0-1137.148",
"binary_name": "linux-tools-4.15.0-1137-aws"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.4.0-1081.88~18.04.1",
"binary_name": "linux-aws-5.4-cloud-tools-5.4.0-1081"
},
{
"binary_version": "5.4.0-1081.88~18.04.1",
"binary_name": "linux-aws-5.4-headers-5.4.0-1081"
},
{
"binary_version": "5.4.0-1081.88~18.04.1",
"binary_name": "linux-aws-5.4-tools-5.4.0-1081"
},
{
"binary_version": "5.4.0-1081.88~18.04.1",
"binary_name": "linux-buildinfo-5.4.0-1081-aws"
},
{
"binary_version": "5.4.0-1081.88~18.04.1",
"binary_name": "linux-cloud-tools-5.4.0-1081-aws"
},
{
"binary_version": "5.4.0-1081.88~18.04.1",
"binary_name": "linux-headers-5.4.0-1081-aws"
},
{
"binary_version": "5.4.0-1081.88~18.04.1",
"binary_name": "linux-image-unsigned-5.4.0-1081-aws"
},
{
"binary_version": "5.4.0-1081.88~18.04.1",
"binary_name": "linux-modules-5.4.0-1081-aws"
},
{
"binary_version": "5.4.0-1081.88~18.04.1",
"binary_name": "linux-modules-extra-5.4.0-1081-aws"
},
{
"binary_version": "5.4.0-1081.88~18.04.1",
"binary_name": "linux-tools-5.4.0-1081-aws"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "4.15.0-1146.161",
"binary_name": "linux-azure-4.15-cloud-tools-4.15.0-1146"
},
{
"binary_version": "4.15.0-1146.161",
"binary_name": "linux-azure-4.15-headers-4.15.0-1146"
},
{
"binary_version": "4.15.0-1146.161",
"binary_name": "linux-azure-4.15-tools-4.15.0-1146"
},
{
"binary_version": "4.15.0-1146.161",
"binary_name": "linux-buildinfo-4.15.0-1146-azure"
},
{
"binary_version": "4.15.0-1146.161",
"binary_name": "linux-cloud-tools-4.15.0-1146-azure"
},
{
"binary_version": "4.15.0-1146.161",
"binary_name": "linux-headers-4.15.0-1146-azure"
},
{
"binary_version": "4.15.0-1146.161",
"binary_name": "linux-image-unsigned-4.15.0-1146-azure"
},
{
"binary_version": "4.15.0-1146.161",
"binary_name": "linux-modules-4.15.0-1146-azure"
},
{
"binary_version": "4.15.0-1146.161",
"binary_name": "linux-modules-extra-4.15.0-1146-azure"
},
{
"binary_version": "4.15.0-1146.161",
"binary_name": "linux-tools-4.15.0-1146-azure"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.4.0-1086.91~18.04.1",
"binary_name": "linux-azure-5.4-cloud-tools-5.4.0-1086"
},
{
"binary_version": "5.4.0-1086.91~18.04.1",
"binary_name": "linux-azure-5.4-headers-5.4.0-1086"
},
{
"binary_version": "5.4.0-1086.91~18.04.1",
"binary_name": "linux-azure-5.4-tools-5.4.0-1086"
},
{
"binary_version": "5.4.0-1086.91~18.04.1",
"binary_name": "linux-buildinfo-5.4.0-1086-azure"
},
{
"binary_version": "5.4.0-1086.91~18.04.1",
"binary_name": "linux-cloud-tools-5.4.0-1086-azure"
},
{
"binary_version": "5.4.0-1086.91~18.04.1",
"binary_name": "linux-headers-5.4.0-1086-azure"
},
{
"binary_version": "5.4.0-1086.91~18.04.1",
"binary_name": "linux-image-unsigned-5.4.0-1086-azure"
},
{
"binary_version": "5.4.0-1086.91~18.04.1",
"binary_name": "linux-modules-5.4.0-1086-azure"
},
{
"binary_version": "5.4.0-1086.91~18.04.1",
"binary_name": "linux-modules-extra-5.4.0-1086-azure"
},
{
"binary_version": "5.4.0-1086.91~18.04.1",
"binary_name": "linux-tools-5.4.0-1086-azure"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "4.15.0-1131.147",
"binary_name": "linux-buildinfo-4.15.0-1131-gcp"
},
{
"binary_version": "4.15.0-1131.147",
"binary_name": "linux-gcp-4.15-headers-4.15.0-1131"
},
{
"binary_version": "4.15.0-1131.147",
"binary_name": "linux-gcp-4.15-tools-4.15.0-1131"
},
{
"binary_version": "4.15.0-1131.147",
"binary_name": "linux-headers-4.15.0-1131-gcp"
},
{
"binary_version": "4.15.0-1131.147",
"binary_name": "linux-image-unsigned-4.15.0-1131-gcp"
},
{
"binary_version": "4.15.0-1131.147",
"binary_name": "linux-modules-4.15.0-1131-gcp"
},
{
"binary_version": "4.15.0-1131.147",
"binary_name": "linux-modules-extra-4.15.0-1131-gcp"
},
{
"binary_version": "4.15.0-1131.147",
"binary_name": "linux-tools-4.15.0-1131-gcp"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.4.0-1084.92~18.04.1",
"binary_name": "linux-buildinfo-5.4.0-1084-gcp"
},
{
"binary_version": "5.4.0-1084.92~18.04.1",
"binary_name": "linux-gcp-5.4-headers-5.4.0-1084"
},
{
"binary_version": "5.4.0-1084.92~18.04.1",
"binary_name": "linux-gcp-5.4-tools-5.4.0-1084"
},
{
"binary_version": "5.4.0-1084.92~18.04.1",
"binary_name": "linux-headers-5.4.0-1084-gcp"
},
{
"binary_version": "5.4.0-1084.92~18.04.1",
"binary_name": "linux-image-unsigned-5.4.0-1084-gcp"
},
{
"binary_version": "5.4.0-1084.92~18.04.1",
"binary_name": "linux-modules-5.4.0-1084-gcp"
},
{
"binary_version": "5.4.0-1084.92~18.04.1",
"binary_name": "linux-modules-extra-5.4.0-1084-gcp"
},
{
"binary_version": "5.4.0-1084.92~18.04.1",
"binary_name": "linux-tools-5.4.0-1084-gcp"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "block-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "block-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "crypto-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "crypto-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "dasd-extra-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "dasd-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "fat-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "fat-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "fb-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "firewire-core-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "floppy-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "fs-core-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "fs-core-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "fs-secondary-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "fs-secondary-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "input-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "input-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "ipmi-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "ipmi-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "kernel-image-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "kernel-image-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-buildinfo-5.4.0-122-generic"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-buildinfo-5.4.0-122-generic-lpae"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-buildinfo-5.4.0-122-lowlatency"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-cloud-tools-5.4.0-122-generic"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-cloud-tools-5.4.0-122-lowlatency"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-headers-5.4.0-122-generic"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-headers-5.4.0-122-generic-lpae"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-headers-5.4.0-122-lowlatency"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-hwe-5.4-cloud-tools-5.4.0-122"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-hwe-5.4-cloud-tools-common"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-hwe-5.4-headers-5.4.0-122"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-hwe-5.4-source-5.4.0"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-hwe-5.4-tools-5.4.0-122"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-hwe-5.4-tools-common"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-hwe-5.4-udebs-generic"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-hwe-5.4-udebs-generic-lpae"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-image-5.4.0-122-generic"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-image-5.4.0-122-generic-lpae"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-image-5.4.0-122-lowlatency"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-image-unsigned-5.4.0-122-generic"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-image-unsigned-5.4.0-122-lowlatency"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-modules-5.4.0-122-generic"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-modules-5.4.0-122-generic-lpae"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-modules-5.4.0-122-lowlatency"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-modules-extra-5.4.0-122-generic"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-tools-5.4.0-122-generic"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-tools-5.4.0-122-generic-lpae"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "linux-tools-5.4.0-122-lowlatency"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "md-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "md-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "message-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "mouse-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "mouse-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "multipath-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "multipath-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "nfs-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "nfs-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "nic-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "nic-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "nic-pcmcia-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "nic-shared-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "nic-shared-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "nic-usb-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "nic-usb-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "parport-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "parport-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "pata-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "pcmcia-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "pcmcia-storage-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "plip-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "plip-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "ppp-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "ppp-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "sata-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "sata-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "scsi-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "scsi-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "serial-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "storage-core-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "storage-core-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "usb-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "usb-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "virtio-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "vlan-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138~18.04.1",
"binary_name": "vlan-modules-5.4.0-122-generic-lpae-di"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.4.0-1029.33~18.04.1",
"binary_name": "linux-buildinfo-5.4.0-1029-ibm"
},
{
"binary_version": "5.4.0-1029.33~18.04.1",
"binary_name": "linux-headers-5.4.0-1029-ibm"
},
{
"binary_version": "5.4.0-1029.33~18.04.1",
"binary_name": "linux-ibm-5.4-cloud-tools-common"
},
{
"binary_version": "5.4.0-1029.33~18.04.1",
"binary_name": "linux-ibm-5.4-headers-5.4.0-1029"
},
{
"binary_version": "5.4.0-1029.33~18.04.1",
"binary_name": "linux-ibm-5.4-source-5.4.0"
},
{
"binary_version": "5.4.0-1029.33~18.04.1",
"binary_name": "linux-ibm-5.4-tools-5.4.0-1029"
},
{
"binary_version": "5.4.0-1029.33~18.04.1",
"binary_name": "linux-ibm-5.4-tools-common"
},
{
"binary_version": "5.4.0-1029.33~18.04.1",
"binary_name": "linux-image-unsigned-5.4.0-1029-ibm"
},
{
"binary_version": "5.4.0-1029.33~18.04.1",
"binary_name": "linux-modules-5.4.0-1029-ibm"
},
{
"binary_version": "5.4.0-1029.33~18.04.1",
"binary_name": "linux-modules-extra-5.4.0-1029-ibm"
},
{
"binary_version": "5.4.0-1029.33~18.04.1",
"binary_name": "linux-tools-5.4.0-1029-ibm"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "4.15.0-1123.128",
"binary_name": "linux-buildinfo-4.15.0-1123-kvm"
},
{
"binary_version": "4.15.0-1123.128",
"binary_name": "linux-headers-4.15.0-1123-kvm"
},
{
"binary_version": "4.15.0-1123.128",
"binary_name": "linux-image-4.15.0-1123-kvm"
},
{
"binary_version": "4.15.0-1123.128",
"binary_name": "linux-kvm-headers-4.15.0-1123"
},
{
"binary_version": "4.15.0-1123.128",
"binary_name": "linux-kvm-tools-4.15.0-1123"
},
{
"binary_version": "4.15.0-1123.128",
"binary_name": "linux-modules-4.15.0-1123-kvm"
},
{
"binary_version": "4.15.0-1123.128",
"binary_name": "linux-tools-4.15.0-1123-kvm"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "4.15.0-1102.113",
"binary_name": "linux-buildinfo-4.15.0-1102-oracle"
},
{
"binary_version": "4.15.0-1102.113",
"binary_name": "linux-headers-4.15.0-1102-oracle"
},
{
"binary_version": "4.15.0-1102.113",
"binary_name": "linux-image-unsigned-4.15.0-1102-oracle"
},
{
"binary_version": "4.15.0-1102.113",
"binary_name": "linux-modules-4.15.0-1102-oracle"
},
{
"binary_version": "4.15.0-1102.113",
"binary_name": "linux-modules-extra-4.15.0-1102-oracle"
},
{
"binary_version": "4.15.0-1102.113",
"binary_name": "linux-oracle-headers-4.15.0-1102"
},
{
"binary_version": "4.15.0-1102.113",
"binary_name": "linux-oracle-tools-4.15.0-1102"
},
{
"binary_version": "4.15.0-1102.113",
"binary_name": "linux-tools-4.15.0-1102-oracle"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.4.0-1079.87~18.04.1",
"binary_name": "linux-buildinfo-5.4.0-1079-oracle"
},
{
"binary_version": "5.4.0-1079.87~18.04.1",
"binary_name": "linux-headers-5.4.0-1079-oracle"
},
{
"binary_version": "5.4.0-1079.87~18.04.1",
"binary_name": "linux-image-unsigned-5.4.0-1079-oracle"
},
{
"binary_version": "5.4.0-1079.87~18.04.1",
"binary_name": "linux-modules-5.4.0-1079-oracle"
},
{
"binary_version": "5.4.0-1079.87~18.04.1",
"binary_name": "linux-modules-extra-5.4.0-1079-oracle"
},
{
"binary_version": "5.4.0-1079.87~18.04.1",
"binary_name": "linux-oracle-5.4-headers-5.4.0-1079"
},
{
"binary_version": "5.4.0-1079.87~18.04.1",
"binary_name": "linux-oracle-5.4-tools-5.4.0-1079"
},
{
"binary_version": "5.4.0-1079.87~18.04.1",
"binary_name": "linux-tools-5.4.0-1079-oracle"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.4.0-1066.76~18.04.1",
"binary_name": "linux-buildinfo-5.4.0-1066-raspi"
},
{
"binary_version": "5.4.0-1066.76~18.04.1",
"binary_name": "linux-headers-5.4.0-1066-raspi"
},
{
"binary_version": "5.4.0-1066.76~18.04.1",
"binary_name": "linux-image-5.4.0-1066-raspi"
},
{
"binary_version": "5.4.0-1066.76~18.04.1",
"binary_name": "linux-modules-5.4.0-1066-raspi"
},
{
"binary_version": "5.4.0-1066.76~18.04.1",
"binary_name": "linux-raspi-5.4-headers-5.4.0-1066"
},
{
"binary_version": "5.4.0-1066.76~18.04.1",
"binary_name": "linux-raspi-5.4-tools-5.4.0-1066"
},
{
"binary_version": "5.4.0-1066.76~18.04.1",
"binary_name": "linux-tools-5.4.0-1066-raspi"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.0.0-1027.30",
"binary_name": "linux-aws-5.0-tools-5.0.0-1027"
},
{
"binary_version": "5.0.0-1027.30",
"binary_name": "linux-aws-headers-5.0.0-1027"
},
{
"binary_version": "5.0.0-1027.30",
"binary_name": "linux-buildinfo-5.0.0-1027-aws"
},
{
"binary_version": "5.0.0-1027.30",
"binary_name": "linux-cloud-tools-5.0.0-1027-aws"
},
{
"binary_version": "5.0.0-1027.30",
"binary_name": "linux-headers-5.0.0-1027-aws"
},
{
"binary_version": "5.0.0-1027.30",
"binary_name": "linux-image-5.0.0-1027-aws"
},
{
"binary_version": "5.0.0-1027.30",
"binary_name": "linux-modules-5.0.0-1027-aws"
},
{
"binary_version": "5.0.0-1027.30",
"binary_name": "linux-modules-extra-5.0.0-1027-aws"
},
{
"binary_version": "5.0.0-1027.30",
"binary_name": "linux-tools-5.0.0-1027-aws"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.3.0-1035.37",
"binary_name": "linux-aws-5.3-cloud-tools-5.3.0-1035"
},
{
"binary_version": "5.3.0-1035.37",
"binary_name": "linux-aws-5.3-headers-5.3.0-1035"
},
{
"binary_version": "5.3.0-1035.37",
"binary_name": "linux-aws-5.3-tools-5.3.0-1035"
},
{
"binary_version": "5.3.0-1035.37",
"binary_name": "linux-buildinfo-5.3.0-1035-aws"
},
{
"binary_version": "5.3.0-1035.37",
"binary_name": "linux-cloud-tools-5.3.0-1035-aws"
},
{
"binary_version": "5.3.0-1035.37",
"binary_name": "linux-headers-5.3.0-1035-aws"
},
{
"binary_version": "5.3.0-1035.37",
"binary_name": "linux-image-5.3.0-1035-aws"
},
{
"binary_version": "5.3.0-1035.37",
"binary_name": "linux-modules-5.3.0-1035-aws"
},
{
"binary_version": "5.3.0-1035.37",
"binary_name": "linux-modules-extra-5.3.0-1035-aws"
},
{
"binary_version": "5.3.0-1035.37",
"binary_name": "linux-tools-5.3.0-1035-aws"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.0.0-1036.38",
"binary_name": "linux-azure-cloud-tools-5.0.0-1036"
},
{
"binary_version": "5.0.0-1036.38",
"binary_name": "linux-azure-headers-5.0.0-1036"
},
{
"binary_version": "5.0.0-1036.38",
"binary_name": "linux-azure-tools-5.0.0-1036"
},
{
"binary_version": "5.0.0-1036.38",
"binary_name": "linux-buildinfo-5.0.0-1036-azure"
},
{
"binary_version": "5.0.0-1036.38",
"binary_name": "linux-cloud-tools-5.0.0-1036-azure"
},
{
"binary_version": "5.0.0-1036.38",
"binary_name": "linux-headers-5.0.0-1036-azure"
},
{
"binary_version": "5.0.0-1036.38",
"binary_name": "linux-image-unsigned-5.0.0-1036-azure"
},
{
"binary_version": "5.0.0-1036.38",
"binary_name": "linux-modules-5.0.0-1036-azure"
},
{
"binary_version": "5.0.0-1036.38",
"binary_name": "linux-modules-extra-5.0.0-1036-azure"
},
{
"binary_version": "5.0.0-1036.38",
"binary_name": "linux-tools-5.0.0-1036-azure"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.3.0-1035.36",
"binary_name": "linux-azure-5.3-cloud-tools-5.3.0-1035"
},
{
"binary_version": "5.3.0-1035.36",
"binary_name": "linux-azure-5.3-headers-5.3.0-1035"
},
{
"binary_version": "5.3.0-1035.36",
"binary_name": "linux-azure-5.3-tools-5.3.0-1035"
},
{
"binary_version": "5.3.0-1035.36",
"binary_name": "linux-buildinfo-5.3.0-1035-azure"
},
{
"binary_version": "5.3.0-1035.36",
"binary_name": "linux-cloud-tools-5.3.0-1035-azure"
},
{
"binary_version": "5.3.0-1035.36",
"binary_name": "linux-headers-5.3.0-1035-azure"
},
{
"binary_version": "5.3.0-1035.36",
"binary_name": "linux-image-unsigned-5.3.0-1035-azure"
},
{
"binary_version": "5.3.0-1035.36",
"binary_name": "linux-modules-5.3.0-1035-azure"
},
{
"binary_version": "5.3.0-1035.36",
"binary_name": "linux-modules-extra-5.3.0-1035-azure"
},
{
"binary_version": "5.3.0-1035.36",
"binary_name": "linux-tools-5.3.0-1035-azure"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.0.0-1012.12~18.04.2",
"binary_name": "linux-azure-edge-cloud-tools-5.0.0-1012"
},
{
"binary_version": "5.0.0-1012.12~18.04.2",
"binary_name": "linux-azure-edge-tools-5.0.0-1012"
},
{
"binary_version": "5.0.0-1012.12~18.04.2",
"binary_name": "linux-azure-headers-5.0.0-1012"
},
{
"binary_version": "5.0.0-1012.12~18.04.2",
"binary_name": "linux-buildinfo-5.0.0-1012-azure"
},
{
"binary_version": "5.0.0-1012.12~18.04.2",
"binary_name": "linux-cloud-tools-5.0.0-1012-azure"
},
{
"binary_version": "5.0.0-1012.12~18.04.2",
"binary_name": "linux-headers-5.0.0-1012-azure"
},
{
"binary_version": "5.0.0-1012.12~18.04.2",
"binary_name": "linux-image-unsigned-5.0.0-1012-azure"
},
{
"binary_version": "5.0.0-1012.12~18.04.2",
"binary_name": "linux-modules-5.0.0-1012-azure"
},
{
"binary_version": "5.0.0-1012.12~18.04.2",
"binary_name": "linux-modules-extra-5.0.0-1012-azure"
},
{
"binary_version": "5.0.0-1012.12~18.04.2",
"binary_name": "linux-tools-5.0.0-1012-azure"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.0.0-1034.35",
"binary_name": "linux-buildinfo-5.0.0-1034-gcp"
},
{
"binary_version": "5.0.0-1034.35",
"binary_name": "linux-gcp-headers-5.0.0-1034"
},
{
"binary_version": "5.0.0-1034.35",
"binary_name": "linux-gcp-tools-5.0.0-1034"
},
{
"binary_version": "5.0.0-1034.35",
"binary_name": "linux-headers-5.0.0-1034-gcp"
},
{
"binary_version": "5.0.0-1034.35",
"binary_name": "linux-image-unsigned-5.0.0-1034-gcp"
},
{
"binary_version": "5.0.0-1034.35",
"binary_name": "linux-modules-5.0.0-1034-gcp"
},
{
"binary_version": "5.0.0-1034.35",
"binary_name": "linux-modules-extra-5.0.0-1034-gcp"
},
{
"binary_version": "5.0.0-1034.35",
"binary_name": "linux-tools-5.0.0-1034-gcp"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.3.0-1032.34~18.04.1",
"binary_name": "linux-buildinfo-5.3.0-1032-gcp"
},
{
"binary_version": "5.3.0-1032.34~18.04.1",
"binary_name": "linux-gcp-5.3-headers-5.3.0-1032"
},
{
"binary_version": "5.3.0-1032.34~18.04.1",
"binary_name": "linux-gcp-5.3-tools-5.3.0-1032"
},
{
"binary_version": "5.3.0-1032.34~18.04.1",
"binary_name": "linux-headers-5.3.0-1032-gcp"
},
{
"binary_version": "5.3.0-1032.34~18.04.1",
"binary_name": "linux-image-unsigned-5.3.0-1032-gcp"
},
{
"binary_version": "5.3.0-1032.34~18.04.1",
"binary_name": "linux-modules-5.3.0-1032-gcp"
},
{
"binary_version": "5.3.0-1032.34~18.04.1",
"binary_name": "linux-modules-extra-5.3.0-1032-gcp"
},
{
"binary_version": "5.3.0-1032.34~18.04.1",
"binary_name": "linux-tools-5.3.0-1032-gcp"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "4.15.0-1079.84",
"binary_name": "linux-buildinfo-4.15.0-1079-gke"
},
{
"binary_version": "4.15.0-1079.84",
"binary_name": "linux-gke-4.15-headers-4.15.0-1079"
},
{
"binary_version": "4.15.0-1079.84",
"binary_name": "linux-gke-4.15-tools-4.15.0-1079"
},
{
"binary_version": "4.15.0-1079.84",
"binary_name": "linux-headers-4.15.0-1079-gke"
},
{
"binary_version": "4.15.0-1079.84",
"binary_name": "linux-image-unsigned-4.15.0-1079-gke"
},
{
"binary_version": "4.15.0-1079.84",
"binary_name": "linux-modules-4.15.0-1079-gke"
},
{
"binary_version": "4.15.0-1079.84",
"binary_name": "linux-modules-extra-4.15.0-1079-gke"
},
{
"binary_version": "4.15.0-1079.84",
"binary_name": "linux-tools-4.15.0-1079-gke"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.4.0-1080.86~18.04.1",
"binary_name": "linux-buildinfo-5.4.0-1080-gke"
},
{
"binary_version": "5.4.0-1080.86~18.04.1",
"binary_name": "linux-gke-5.4-headers-5.4.0-1080"
},
{
"binary_version": "5.4.0-1080.86~18.04.1",
"binary_name": "linux-gke-5.4-tools-5.4.0-1080"
},
{
"binary_version": "5.4.0-1080.86~18.04.1",
"binary_name": "linux-headers-5.4.0-1080-gke"
},
{
"binary_version": "5.4.0-1080.86~18.04.1",
"binary_name": "linux-image-unsigned-5.4.0-1080-gke"
},
{
"binary_version": "5.4.0-1080.86~18.04.1",
"binary_name": "linux-modules-5.4.0-1080-gke"
},
{
"binary_version": "5.4.0-1080.86~18.04.1",
"binary_name": "linux-modules-extra-5.4.0-1080-gke"
},
{
"binary_version": "5.4.0-1080.86~18.04.1",
"binary_name": "linux-tools-5.4.0-1080-gke"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.4.0-1051.54~18.04.1",
"binary_name": "linux-buildinfo-5.4.0-1051-gkeop"
},
{
"binary_version": "5.4.0-1051.54~18.04.1",
"binary_name": "linux-cloud-tools-5.4.0-1051-gkeop"
},
{
"binary_version": "5.4.0-1051.54~18.04.1",
"binary_name": "linux-gkeop-5.4-cloud-tools-5.4.0-1051"
},
{
"binary_version": "5.4.0-1051.54~18.04.1",
"binary_name": "linux-gkeop-5.4-headers-5.4.0-1051"
},
{
"binary_version": "5.4.0-1051.54~18.04.1",
"binary_name": "linux-gkeop-5.4-source-5.4.0"
},
{
"binary_version": "5.4.0-1051.54~18.04.1",
"binary_name": "linux-gkeop-5.4-tools-5.4.0-1051"
},
{
"binary_version": "5.4.0-1051.54~18.04.1",
"binary_name": "linux-headers-5.4.0-1051-gkeop"
},
{
"binary_version": "5.4.0-1051.54~18.04.1",
"binary_name": "linux-image-unsigned-5.4.0-1051-gkeop"
},
{
"binary_version": "5.4.0-1051.54~18.04.1",
"binary_name": "linux-modules-5.4.0-1051-gkeop"
},
{
"binary_version": "5.4.0-1051.54~18.04.1",
"binary_name": "linux-modules-extra-5.4.0-1051-gkeop"
},
{
"binary_version": "5.4.0-1051.54~18.04.1",
"binary_name": "linux-tools-5.4.0-1051-gkeop"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.3.0-76.72",
"binary_name": "block-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "crypto-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "fat-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "fb-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "firewire-core-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "floppy-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "fs-core-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "fs-secondary-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "input-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "ipmi-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "kernel-image-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-buildinfo-5.3.0-76-generic"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-buildinfo-5.3.0-76-lowlatency"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-cloud-tools-5.3.0-76-generic"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-cloud-tools-5.3.0-76-lowlatency"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-headers-5.3.0-76-generic"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-headers-5.3.0-76-lowlatency"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-hwe-cloud-tools-5.3.0-76"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-hwe-headers-5.3.0-76"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-hwe-tools-5.3.0-76"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-hwe-udebs-generic"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-image-5.3.0-76-generic"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-image-5.3.0-76-lowlatency"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-image-unsigned-5.3.0-76-generic"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-image-unsigned-5.3.0-76-lowlatency"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-modules-5.3.0-76-generic"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-modules-5.3.0-76-lowlatency"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-modules-extra-5.3.0-76-generic"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-source-5.3.0"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-tools-5.3.0-76-generic"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-tools-5.3.0-76-lowlatency"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "md-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "message-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "mouse-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "multipath-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "nfs-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "nic-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "nic-pcmcia-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "nic-shared-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "nic-usb-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "parport-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "pata-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "pcmcia-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "pcmcia-storage-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "plip-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "ppp-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "sata-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "scsi-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "serial-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "storage-core-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "usb-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "virtio-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "vlan-modules-5.3.0-76-generic-di"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "block-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "block-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "crypto-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "crypto-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "dasd-extra-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "dasd-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "fat-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "fat-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "fb-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "firewire-core-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "floppy-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "fs-core-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "fs-core-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "fs-secondary-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "fs-secondary-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "input-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "input-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "ipmi-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "ipmi-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "kernel-image-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "kernel-image-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-buildinfo-5.3.0-24-generic"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-buildinfo-5.3.0-24-generic-lpae"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-buildinfo-5.3.0-24-lowlatency"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-cloud-tools-5.3.0-24-generic"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-cloud-tools-5.3.0-24-lowlatency"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-headers-5.3.0-24"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-headers-5.3.0-24-generic"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-headers-5.3.0-24-generic-lpae"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-headers-5.3.0-24-lowlatency"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-hwe-edge-cloud-tools-5.3.0-24"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-hwe-edge-tools-5.3.0-24"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-hwe-edge-udebs-generic"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-hwe-edge-udebs-generic-lpae"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-image-5.3.0-24-generic"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-image-5.3.0-24-generic-lpae"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-image-5.3.0-24-lowlatency"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-image-unsigned-5.3.0-24-generic"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-image-unsigned-5.3.0-24-lowlatency"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-modules-5.3.0-24-generic"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-modules-5.3.0-24-generic-lpae"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-modules-5.3.0-24-lowlatency"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-modules-extra-5.3.0-24-generic"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-source-5.3.0"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-tools-5.3.0-24-generic"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-tools-5.3.0-24-generic-lpae"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-tools-5.3.0-24-lowlatency"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "md-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "md-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "message-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "mouse-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "mouse-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "multipath-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "multipath-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "nfs-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "nfs-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "nic-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "nic-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "nic-pcmcia-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "nic-shared-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "nic-shared-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "nic-usb-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "nic-usb-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "parport-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "parport-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "pata-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "pcmcia-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "pcmcia-storage-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "plip-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "plip-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "ppp-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "ppp-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "sata-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "sata-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "scsi-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "scsi-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "serial-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "storage-core-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "storage-core-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "usb-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "usb-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "virtio-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "vlan-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "vlan-modules-5.3.0-24-generic-lpae-di"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "4.15.0-1103.114",
"binary_name": "block-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "crypto-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "fat-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "fb-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "firewire-core-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "floppy-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "fs-core-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "fs-secondary-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "input-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "ipmi-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "irda-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "kernel-image-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "linux-buildinfo-4.15.0-1103-oem"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "linux-headers-4.15.0-1103-oem"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "linux-image-unsigned-4.15.0-1103-oem"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "linux-modules-4.15.0-1103-oem"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "linux-oem-headers-4.15.0-1103"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "linux-oem-tools-4.15.0-1103"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "linux-tools-4.15.0-1103-oem"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "linux-udebs-oem"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "md-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "message-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "mouse-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "multipath-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "nfs-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "nic-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "nic-pcmcia-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "nic-shared-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "nic-usb-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "parport-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "pata-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "pcmcia-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "pcmcia-storage-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "plip-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "ppp-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "sata-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "scsi-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "serial-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "storage-core-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "usb-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "virtio-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "vlan-modules-4.15.0-1103-oem-di"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.0.0-1014.19",
"binary_name": "linux-buildinfo-5.0.0-1014-oracle"
},
{
"binary_version": "5.0.0-1014.19",
"binary_name": "linux-headers-5.0.0-1014-oracle"
},
{
"binary_version": "5.0.0-1014.19",
"binary_name": "linux-image-unsigned-5.0.0-1014-oracle"
},
{
"binary_version": "5.0.0-1014.19",
"binary_name": "linux-modules-5.0.0-1014-oracle"
},
{
"binary_version": "5.0.0-1014.19",
"binary_name": "linux-modules-extra-5.0.0-1014-oracle"
},
{
"binary_version": "5.0.0-1014.19",
"binary_name": "linux-oracle-5.0-headers-5.0.0-1014"
},
{
"binary_version": "5.0.0-1014.19",
"binary_name": "linux-oracle-5.0-tools-5.0.0-1014"
},
{
"binary_version": "5.0.0-1014.19",
"binary_name": "linux-tools-5.0.0-1014-oracle"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.3.0-1030.32~18.04.1",
"binary_name": "linux-buildinfo-5.3.0-1030-oracle"
},
{
"binary_version": "5.3.0-1030.32~18.04.1",
"binary_name": "linux-headers-5.3.0-1030-oracle"
},
{
"binary_version": "5.3.0-1030.32~18.04.1",
"binary_name": "linux-image-unsigned-5.3.0-1030-oracle"
},
{
"binary_version": "5.3.0-1030.32~18.04.1",
"binary_name": "linux-modules-5.3.0-1030-oracle"
},
{
"binary_version": "5.3.0-1030.32~18.04.1",
"binary_name": "linux-modules-extra-5.3.0-1030-oracle"
},
{
"binary_version": "5.3.0-1030.32~18.04.1",
"binary_name": "linux-oracle-5.3-headers-5.3.0-1030"
},
{
"binary_version": "5.3.0-1030.32~18.04.1",
"binary_name": "linux-oracle-5.3-tools-5.3.0-1030"
},
{
"binary_version": "5.3.0-1030.32~18.04.1",
"binary_name": "linux-tools-5.3.0-1030-oracle"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.4.0-122.138",
"binary_name": "block-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "block-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "crypto-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "crypto-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "dasd-extra-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "dasd-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "fat-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "fat-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "fb-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "firewire-core-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "floppy-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "fs-core-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "fs-core-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "fs-secondary-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "fs-secondary-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "input-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "input-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "ipmi-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "ipmi-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "kernel-image-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "kernel-image-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-buildinfo-5.4.0-122-generic"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-buildinfo-5.4.0-122-generic-lpae"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-buildinfo-5.4.0-122-lowlatency"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-cloud-tools-5.4.0-122"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-cloud-tools-5.4.0-122-generic"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-cloud-tools-5.4.0-122-lowlatency"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-cloud-tools-common"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-headers-5.4.0-122"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-headers-5.4.0-122-generic"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-headers-5.4.0-122-generic-lpae"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-headers-5.4.0-122-lowlatency"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-image-5.4.0-122-generic"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-image-5.4.0-122-generic-lpae"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-image-unsigned-5.4.0-122-generic"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-image-unsigned-5.4.0-122-lowlatency"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-libc-dev"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-modules-5.4.0-122-generic"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-modules-5.4.0-122-generic-lpae"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-modules-5.4.0-122-lowlatency"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-modules-extra-5.4.0-122-generic"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-source-5.4.0"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-tools-5.4.0-122"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-tools-5.4.0-122-generic"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-tools-5.4.0-122-generic-lpae"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-tools-5.4.0-122-lowlatency"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-tools-common"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-tools-host"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-udebs-generic"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "linux-udebs-generic-lpae"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "md-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "md-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "message-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "mouse-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "mouse-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "multipath-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "multipath-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "nfs-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "nfs-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "nic-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "nic-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "nic-pcmcia-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "nic-shared-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "nic-shared-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "nic-usb-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "nic-usb-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "parport-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "parport-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "pata-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "pcmcia-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "pcmcia-storage-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "plip-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "plip-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "ppp-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "ppp-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "sata-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "sata-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "scsi-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "scsi-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "serial-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "storage-core-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "storage-core-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "usb-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "usb-modules-5.4.0-122-generic-lpae-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "virtio-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "vlan-modules-5.4.0-122-generic-di"
},
{
"binary_version": "5.4.0-122.138",
"binary_name": "vlan-modules-5.4.0-122-generic-lpae-di"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.4.0-1081.88",
"binary_name": "linux-aws-cloud-tools-5.4.0-1081"
},
{
"binary_version": "5.4.0-1081.88",
"binary_name": "linux-aws-headers-5.4.0-1081"
},
{
"binary_version": "5.4.0-1081.88",
"binary_name": "linux-aws-tools-5.4.0-1081"
},
{
"binary_version": "5.4.0-1081.88",
"binary_name": "linux-buildinfo-5.4.0-1081-aws"
},
{
"binary_version": "5.4.0-1081.88",
"binary_name": "linux-cloud-tools-5.4.0-1081-aws"
},
{
"binary_version": "5.4.0-1081.88",
"binary_name": "linux-headers-5.4.0-1081-aws"
},
{
"binary_version": "5.4.0-1081.88",
"binary_name": "linux-image-unsigned-5.4.0-1081-aws"
},
{
"binary_version": "5.4.0-1081.88",
"binary_name": "linux-modules-5.4.0-1081-aws"
},
{
"binary_version": "5.4.0-1081.88",
"binary_name": "linux-modules-extra-5.4.0-1081-aws"
},
{
"binary_version": "5.4.0-1081.88",
"binary_name": "linux-tools-5.4.0-1081-aws"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.4.0-1086.91",
"binary_name": "linux-azure-cloud-tools-5.4.0-1086"
},
{
"binary_version": "5.4.0-1086.91",
"binary_name": "linux-azure-headers-5.4.0-1086"
},
{
"binary_version": "5.4.0-1086.91",
"binary_name": "linux-azure-tools-5.4.0-1086"
},
{
"binary_version": "5.4.0-1086.91",
"binary_name": "linux-buildinfo-5.4.0-1086-azure"
},
{
"binary_version": "5.4.0-1086.91",
"binary_name": "linux-cloud-tools-5.4.0-1086-azure"
},
{
"binary_version": "5.4.0-1086.91",
"binary_name": "linux-headers-5.4.0-1086-azure"
},
{
"binary_version": "5.4.0-1086.91",
"binary_name": "linux-image-unsigned-5.4.0-1086-azure"
},
{
"binary_version": "5.4.0-1086.91",
"binary_name": "linux-modules-5.4.0-1086-azure"
},
{
"binary_version": "5.4.0-1086.91",
"binary_name": "linux-modules-extra-5.4.0-1086-azure"
},
{
"binary_version": "5.4.0-1086.91",
"binary_name": "linux-tools-5.4.0-1086-azure"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.15.0-1008.9~20.04.1",
"binary_name": "linux-azure-5.15-cloud-tools-5.15.0-1008"
},
{
"binary_version": "5.15.0-1008.9~20.04.1",
"binary_name": "linux-azure-5.15-headers-5.15.0-1008"
},
{
"binary_version": "5.15.0-1008.9~20.04.1",
"binary_name": "linux-azure-5.15-tools-5.15.0-1008"
},
{
"binary_version": "5.15.0-1008.9~20.04.1",
"binary_name": "linux-buildinfo-5.15.0-1008-azure"
},
{
"binary_version": "5.15.0-1008.9~20.04.1",
"binary_name": "linux-cloud-tools-5.15.0-1008-azure"
},
{
"binary_version": "5.15.0-1008.9~20.04.1",
"binary_name": "linux-headers-5.15.0-1008-azure"
},
{
"binary_version": "5.15.0-1008.9~20.04.1",
"binary_name": "linux-image-unsigned-5.15.0-1008-azure"
},
{
"binary_version": "5.15.0-1008.9~20.04.1",
"binary_name": "linux-modules-5.15.0-1008-azure"
},
{
"binary_version": "5.15.0-1008.9~20.04.1",
"binary_name": "linux-modules-extra-5.15.0-1008-azure"
},
{
"binary_version": "5.15.0-1008.9~20.04.1",
"binary_name": "linux-tools-5.15.0-1008-azure"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.4.0-1042.47",
"binary_name": "linux-bluefield-headers-5.4.0-1042"
},
{
"binary_version": "5.4.0-1042.47",
"binary_name": "linux-bluefield-tools-5.4.0-1042"
},
{
"binary_version": "5.4.0-1042.47",
"binary_name": "linux-buildinfo-5.4.0-1042-bluefield"
},
{
"binary_version": "5.4.0-1042.47",
"binary_name": "linux-headers-5.4.0-1042-bluefield"
},
{
"binary_version": "5.4.0-1042.47",
"binary_name": "linux-image-unsigned-5.4.0-1042-bluefield"
},
{
"binary_version": "5.4.0-1042.47",
"binary_name": "linux-modules-5.4.0-1042-bluefield"
},
{
"binary_version": "5.4.0-1042.47",
"binary_name": "linux-tools-5.4.0-1042-bluefield"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.4.0-1084.92",
"binary_name": "linux-buildinfo-5.4.0-1084-gcp"
},
{
"binary_version": "5.4.0-1084.92",
"binary_name": "linux-gcp-headers-5.4.0-1084"
},
{
"binary_version": "5.4.0-1084.92",
"binary_name": "linux-gcp-tools-5.4.0-1084"
},
{
"binary_version": "5.4.0-1084.92",
"binary_name": "linux-headers-5.4.0-1084-gcp"
},
{
"binary_version": "5.4.0-1084.92",
"binary_name": "linux-image-unsigned-5.4.0-1084-gcp"
},
{
"binary_version": "5.4.0-1084.92",
"binary_name": "linux-modules-5.4.0-1084-gcp"
},
{
"binary_version": "5.4.0-1084.92",
"binary_name": "linux-modules-extra-5.4.0-1084-gcp"
},
{
"binary_version": "5.4.0-1084.92",
"binary_name": "linux-tools-5.4.0-1084-gcp"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.15.0-41.44~20.04.1",
"binary_name": "linux-buildinfo-5.15.0-41-generic"
},
{
"binary_version": "5.15.0-41.44~20.04.1",
"binary_name": "linux-buildinfo-5.15.0-41-generic-64k"
},
{
"binary_version": "5.15.0-41.44~20.04.1",
"binary_name": "linux-buildinfo-5.15.0-41-generic-lpae"
},
{
"binary_version": "5.15.0-41.44~20.04.1",
"binary_name": "linux-cloud-tools-5.15.0-41-generic"
},
{
"binary_version": "5.15.0-41.44~20.04.1",
"binary_name": "linux-headers-5.15.0-41-generic"
},
{
"binary_version": "5.15.0-41.44~20.04.1",
"binary_name": "linux-headers-5.15.0-41-generic-64k"
},
{
"binary_version": "5.15.0-41.44~20.04.1",
"binary_name": "linux-headers-5.15.0-41-generic-lpae"
},
{
"binary_version": "5.15.0-41.44~20.04.1",
"binary_name": "linux-hwe-5.15-cloud-tools-5.15.0-41"
},
{
"binary_version": "5.15.0-41.44~20.04.1",
"binary_name": "linux-hwe-5.15-cloud-tools-common"
},
{
"binary_version": "5.15.0-41.44~20.04.1",
"binary_name": "linux-hwe-5.15-headers-5.15.0-41"
},
{
"binary_version": "5.15.0-41.44~20.04.1",
"binary_name": "linux-hwe-5.15-source-5.15.0"
},
{
"binary_version": "5.15.0-41.44~20.04.1",
"binary_name": "linux-hwe-5.15-tools-5.15.0-41"
},
{
"binary_version": "5.15.0-41.44~20.04.1",
"binary_name": "linux-hwe-5.15-tools-common"
},
{
"binary_version": "5.15.0-41.44~20.04.1",
"binary_name": "linux-hwe-5.15-tools-host"
},
{
"binary_version": "5.15.0-41.44~20.04.1",
"binary_name": "linux-image-5.15.0-41-generic"
},
{
"binary_version": "5.15.0-41.44~20.04.1",
"binary_name": "linux-image-5.15.0-41-generic-lpae"
},
{
"binary_version": "5.15.0-41.44~20.04.1",
"binary_name": "linux-image-unsigned-5.15.0-41-generic"
},
{
"binary_version": "5.15.0-41.44~20.04.1",
"binary_name": "linux-image-unsigned-5.15.0-41-generic-64k"
},
{
"binary_version": "5.15.0-41.44~20.04.1",
"binary_name": "linux-modules-5.15.0-41-generic"
},
{
"binary_version": "5.15.0-41.44~20.04.1",
"binary_name": "linux-modules-5.15.0-41-generic-64k"
},
{
"binary_version": "5.15.0-41.44~20.04.1",
"binary_name": "linux-modules-5.15.0-41-generic-lpae"
},
{
"binary_version": "5.15.0-41.44~20.04.1",
"binary_name": "linux-modules-extra-5.15.0-41-generic"
},
{
"binary_version": "5.15.0-41.44~20.04.1",
"binary_name": "linux-modules-iwlwifi-5.15.0-41-generic"
},
{
"binary_version": "5.15.0-41.44~20.04.1",
"binary_name": "linux-tools-5.15.0-41-generic"
},
{
"binary_version": "5.15.0-41.44~20.04.1",
"binary_name": "linux-tools-5.15.0-41-generic-64k"
},
{
"binary_version": "5.15.0-41.44~20.04.1",
"binary_name": "linux-tools-5.15.0-41-generic-lpae"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.4.0-1029.33",
"binary_name": "linux-buildinfo-5.4.0-1029-ibm"
},
{
"binary_version": "5.4.0-1029.33",
"binary_name": "linux-headers-5.4.0-1029-ibm"
},
{
"binary_version": "5.4.0-1029.33",
"binary_name": "linux-ibm-cloud-tools-common"
},
{
"binary_version": "5.4.0-1029.33",
"binary_name": "linux-ibm-headers-5.4.0-1029"
},
{
"binary_version": "5.4.0-1029.33",
"binary_name": "linux-ibm-source-5.4.0"
},
{
"binary_version": "5.4.0-1029.33",
"binary_name": "linux-ibm-tools-5.4.0-1029"
},
{
"binary_version": "5.4.0-1029.33",
"binary_name": "linux-ibm-tools-common"
},
{
"binary_version": "5.4.0-1029.33",
"binary_name": "linux-image-unsigned-5.4.0-1029-ibm"
},
{
"binary_version": "5.4.0-1029.33",
"binary_name": "linux-modules-5.4.0-1029-ibm"
},
{
"binary_version": "5.4.0-1029.33",
"binary_name": "linux-modules-extra-5.4.0-1029-ibm"
},
{
"binary_version": "5.4.0-1029.33",
"binary_name": "linux-tools-5.4.0-1029-ibm"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.15.0-1008.11~20.04.1",
"binary_name": "linux-buildinfo-5.15.0-1008-intel-iotg"
},
{
"binary_version": "5.15.0-1008.11~20.04.1",
"binary_name": "linux-cloud-tools-5.15.0-1008-intel-iotg"
},
{
"binary_version": "5.15.0-1008.11~20.04.1",
"binary_name": "linux-headers-5.15.0-1008-intel-iotg"
},
{
"binary_version": "5.15.0-1008.11~20.04.1",
"binary_name": "linux-image-unsigned-5.15.0-1008-intel-iotg"
},
{
"binary_version": "5.15.0-1008.11~20.04.1",
"binary_name": "linux-intel-iotg-5.15-cloud-tools-5.15.0-1008"
},
{
"binary_version": "5.15.0-1008.11~20.04.1",
"binary_name": "linux-intel-iotg-5.15-cloud-tools-common"
},
{
"binary_version": "5.15.0-1008.11~20.04.1",
"binary_name": "linux-intel-iotg-5.15-headers-5.15.0-1008"
},
{
"binary_version": "5.15.0-1008.11~20.04.1",
"binary_name": "linux-intel-iotg-5.15-tools-5.15.0-1008"
},
{
"binary_version": "5.15.0-1008.11~20.04.1",
"binary_name": "linux-intel-iotg-5.15-tools-common"
},
{
"binary_version": "5.15.0-1008.11~20.04.1",
"binary_name": "linux-intel-iotg-5.15-tools-host"
},
{
"binary_version": "5.15.0-1008.11~20.04.1",
"binary_name": "linux-modules-5.15.0-1008-intel-iotg"
},
{
"binary_version": "5.15.0-1008.11~20.04.1",
"binary_name": "linux-modules-extra-5.15.0-1008-intel-iotg"
},
{
"binary_version": "5.15.0-1008.11~20.04.1",
"binary_name": "linux-tools-5.15.0-1008-intel-iotg"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.4.0-1004.6",
"binary_name": "linux-buildinfo-5.4.0-1004-iot"
},
{
"binary_version": "5.4.0-1004.6",
"binary_name": "linux-headers-5.4.0-1004-iot"
},
{
"binary_version": "5.4.0-1004.6",
"binary_name": "linux-image-unsigned-5.4.0-1004-iot"
},
{
"binary_version": "5.4.0-1004.6",
"binary_name": "linux-iot-headers-5.4.0-1004"
},
{
"binary_version": "5.4.0-1004.6",
"binary_name": "linux-iot-tools-5.4.0-1004"
},
{
"binary_version": "5.4.0-1004.6",
"binary_name": "linux-iot-tools-common"
},
{
"binary_version": "5.4.0-1004.6",
"binary_name": "linux-modules-5.4.0-1004-iot"
},
{
"binary_version": "5.4.0-1004.6",
"binary_name": "linux-tools-5.4.0-1004-iot"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.4.0-1071.76",
"binary_name": "linux-buildinfo-5.4.0-1071-kvm"
},
{
"binary_version": "5.4.0-1071.76",
"binary_name": "linux-headers-5.4.0-1071-kvm"
},
{
"binary_version": "5.4.0-1071.76",
"binary_name": "linux-image-unsigned-5.4.0-1071-kvm"
},
{
"binary_version": "5.4.0-1071.76",
"binary_name": "linux-kvm-headers-5.4.0-1071"
},
{
"binary_version": "5.4.0-1071.76",
"binary_name": "linux-kvm-tools-5.4.0-1071"
},
{
"binary_version": "5.4.0-1071.76",
"binary_name": "linux-modules-5.4.0-1071-kvm"
},
{
"binary_version": "5.4.0-1071.76",
"binary_name": "linux-tools-5.4.0-1071-kvm"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.15.0-42.45~20.04.1",
"binary_name": "linux-buildinfo-5.15.0-42-lowlatency"
},
{
"binary_version": "5.15.0-42.45~20.04.1",
"binary_name": "linux-buildinfo-5.15.0-42-lowlatency-64k"
},
{
"binary_version": "5.15.0-42.45~20.04.1",
"binary_name": "linux-cloud-tools-5.15.0-42-lowlatency"
},
{
"binary_version": "5.15.0-42.45~20.04.1",
"binary_name": "linux-headers-5.15.0-42-lowlatency"
},
{
"binary_version": "5.15.0-42.45~20.04.1",
"binary_name": "linux-headers-5.15.0-42-lowlatency-64k"
},
{
"binary_version": "5.15.0-42.45~20.04.1",
"binary_name": "linux-image-unsigned-5.15.0-42-lowlatency"
},
{
"binary_version": "5.15.0-42.45~20.04.1",
"binary_name": "linux-image-unsigned-5.15.0-42-lowlatency-64k"
},
{
"binary_version": "5.15.0-42.45~20.04.1",
"binary_name": "linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-42"
},
{
"binary_version": "5.15.0-42.45~20.04.1",
"binary_name": "linux-lowlatency-hwe-5.15-cloud-tools-common"
},
{
"binary_version": "5.15.0-42.45~20.04.1",
"binary_name": "linux-lowlatency-hwe-5.15-headers-5.15.0-42"
},
{
"binary_version": "5.15.0-42.45~20.04.1",
"binary_name": "linux-lowlatency-hwe-5.15-tools-5.15.0-42"
},
{
"binary_version": "5.15.0-42.45~20.04.1",
"binary_name": "linux-lowlatency-hwe-5.15-tools-common"
},
{
"binary_version": "5.15.0-42.45~20.04.1",
"binary_name": "linux-lowlatency-hwe-5.15-tools-host"
},
{
"binary_version": "5.15.0-42.45~20.04.1",
"binary_name": "linux-modules-5.15.0-42-lowlatency"
},
{
"binary_version": "5.15.0-42.45~20.04.1",
"binary_name": "linux-modules-5.15.0-42-lowlatency-64k"
},
{
"binary_version": "5.15.0-42.45~20.04.1",
"binary_name": "linux-modules-iwlwifi-5.15.0-42-lowlatency"
},
{
"binary_version": "5.15.0-42.45~20.04.1",
"binary_name": "linux-tools-5.15.0-42-lowlatency"
},
{
"binary_version": "5.15.0-42.45~20.04.1",
"binary_name": "linux-tools-5.15.0-42-lowlatency-64k"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.4.0-1079.87",
"binary_name": "linux-buildinfo-5.4.0-1079-oracle"
},
{
"binary_version": "5.4.0-1079.87",
"binary_name": "linux-headers-5.4.0-1079-oracle"
},
{
"binary_version": "5.4.0-1079.87",
"binary_name": "linux-image-unsigned-5.4.0-1079-oracle"
},
{
"binary_version": "5.4.0-1079.87",
"binary_name": "linux-modules-5.4.0-1079-oracle"
},
{
"binary_version": "5.4.0-1079.87",
"binary_name": "linux-modules-extra-5.4.0-1079-oracle"
},
{
"binary_version": "5.4.0-1079.87",
"binary_name": "linux-oracle-headers-5.4.0-1079"
},
{
"binary_version": "5.4.0-1079.87",
"binary_name": "linux-oracle-tools-5.4.0-1079"
},
{
"binary_version": "5.4.0-1079.87",
"binary_name": "linux-tools-5.4.0-1079-oracle"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.4.0-1066.76",
"binary_name": "linux-buildinfo-5.4.0-1066-raspi"
},
{
"binary_version": "5.4.0-1066.76",
"binary_name": "linux-headers-5.4.0-1066-raspi"
},
{
"binary_version": "5.4.0-1066.76",
"binary_name": "linux-image-5.4.0-1066-raspi"
},
{
"binary_version": "5.4.0-1066.76",
"binary_name": "linux-modules-5.4.0-1066-raspi"
},
{
"binary_version": "5.4.0-1066.76",
"binary_name": "linux-raspi-headers-5.4.0-1066"
},
{
"binary_version": "5.4.0-1066.76",
"binary_name": "linux-raspi-tools-5.4.0-1066"
},
{
"binary_version": "5.4.0-1066.76",
"binary_name": "linux-tools-5.4.0-1066-raspi"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-aws-5.11-cloud-tools-5.11.0-1028"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-aws-5.11-headers-5.11.0-1028"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-aws-5.11-tools-5.11.0-1028"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-buildinfo-5.11.0-1028-aws"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-cloud-tools-5.11.0-1028-aws"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-headers-5.11.0-1028-aws"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-image-unsigned-5.11.0-1028-aws"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-modules-5.11.0-1028-aws"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-modules-extra-5.11.0-1028-aws"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-tools-5.11.0-1028-aws"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.13.0-1031.35~20.04.1",
"binary_name": "linux-aws-5.13-cloud-tools-5.13.0-1031"
},
{
"binary_version": "5.13.0-1031.35~20.04.1",
"binary_name": "linux-aws-5.13-headers-5.13.0-1031"
},
{
"binary_version": "5.13.0-1031.35~20.04.1",
"binary_name": "linux-aws-5.13-tools-5.13.0-1031"
},
{
"binary_version": "5.13.0-1031.35~20.04.1",
"binary_name": "linux-buildinfo-5.13.0-1031-aws"
},
{
"binary_version": "5.13.0-1031.35~20.04.1",
"binary_name": "linux-cloud-tools-5.13.0-1031-aws"
},
{
"binary_version": "5.13.0-1031.35~20.04.1",
"binary_name": "linux-headers-5.13.0-1031-aws"
},
{
"binary_version": "5.13.0-1031.35~20.04.1",
"binary_name": "linux-image-unsigned-5.13.0-1031-aws"
},
{
"binary_version": "5.13.0-1031.35~20.04.1",
"binary_name": "linux-modules-5.13.0-1031-aws"
},
{
"binary_version": "5.13.0-1031.35~20.04.1",
"binary_name": "linux-modules-extra-5.13.0-1031-aws"
},
{
"binary_version": "5.13.0-1031.35~20.04.1",
"binary_name": "linux-tools-5.13.0-1031-aws"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.8.0-1042.44~20.04.1",
"binary_name": "linux-aws-5.8-cloud-tools-5.8.0-1042"
},
{
"binary_version": "5.8.0-1042.44~20.04.1",
"binary_name": "linux-aws-5.8-headers-5.8.0-1042"
},
{
"binary_version": "5.8.0-1042.44~20.04.1",
"binary_name": "linux-aws-5.8-tools-5.8.0-1042"
},
{
"binary_version": "5.8.0-1042.44~20.04.1",
"binary_name": "linux-buildinfo-5.8.0-1042-aws"
},
{
"binary_version": "5.8.0-1042.44~20.04.1",
"binary_name": "linux-cloud-tools-5.8.0-1042-aws"
},
{
"binary_version": "5.8.0-1042.44~20.04.1",
"binary_name": "linux-headers-5.8.0-1042-aws"
},
{
"binary_version": "5.8.0-1042.44~20.04.1",
"binary_name": "linux-image-5.8.0-1042-aws"
},
{
"binary_version": "5.8.0-1042.44~20.04.1",
"binary_name": "linux-modules-5.8.0-1042-aws"
},
{
"binary_version": "5.8.0-1042.44~20.04.1",
"binary_name": "linux-modules-extra-5.8.0-1042-aws"
},
{
"binary_version": "5.8.0-1042.44~20.04.1",
"binary_name": "linux-tools-5.8.0-1042-aws"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.11.0-1028.31~20.04.2",
"binary_name": "linux-azure-5.11-cloud-tools-5.11.0-1028"
},
{
"binary_version": "5.11.0-1028.31~20.04.2",
"binary_name": "linux-azure-5.11-headers-5.11.0-1028"
},
{
"binary_version": "5.11.0-1028.31~20.04.2",
"binary_name": "linux-azure-5.11-tools-5.11.0-1028"
},
{
"binary_version": "5.11.0-1028.31~20.04.2",
"binary_name": "linux-buildinfo-5.11.0-1028-azure"
},
{
"binary_version": "5.11.0-1028.31~20.04.2",
"binary_name": "linux-cloud-tools-5.11.0-1028-azure"
},
{
"binary_version": "5.11.0-1028.31~20.04.2",
"binary_name": "linux-headers-5.11.0-1028-azure"
},
{
"binary_version": "5.11.0-1028.31~20.04.2",
"binary_name": "linux-image-unsigned-5.11.0-1028-azure"
},
{
"binary_version": "5.11.0-1028.31~20.04.2",
"binary_name": "linux-modules-5.11.0-1028-azure"
},
{
"binary_version": "5.11.0-1028.31~20.04.2",
"binary_name": "linux-modules-extra-5.11.0-1028-azure"
},
{
"binary_version": "5.11.0-1028.31~20.04.2",
"binary_name": "linux-tools-5.11.0-1028-azure"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.13.0-1031.37~20.04.1",
"binary_name": "linux-azure-5.13-cloud-tools-5.13.0-1031"
},
{
"binary_version": "5.13.0-1031.37~20.04.1",
"binary_name": "linux-azure-5.13-headers-5.13.0-1031"
},
{
"binary_version": "5.13.0-1031.37~20.04.1",
"binary_name": "linux-azure-5.13-tools-5.13.0-1031"
},
{
"binary_version": "5.13.0-1031.37~20.04.1",
"binary_name": "linux-buildinfo-5.13.0-1031-azure"
},
{
"binary_version": "5.13.0-1031.37~20.04.1",
"binary_name": "linux-cloud-tools-5.13.0-1031-azure"
},
{
"binary_version": "5.13.0-1031.37~20.04.1",
"binary_name": "linux-headers-5.13.0-1031-azure"
},
{
"binary_version": "5.13.0-1031.37~20.04.1",
"binary_name": "linux-image-unsigned-5.13.0-1031-azure"
},
{
"binary_version": "5.13.0-1031.37~20.04.1",
"binary_name": "linux-modules-5.13.0-1031-azure"
},
{
"binary_version": "5.13.0-1031.37~20.04.1",
"binary_name": "linux-modules-extra-5.13.0-1031-azure"
},
{
"binary_version": "5.13.0-1031.37~20.04.1",
"binary_name": "linux-tools-5.13.0-1031-azure"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.8.0-1043.46~20.04.1",
"binary_name": "linux-azure-5.8-cloud-tools-5.8.0-1043"
},
{
"binary_version": "5.8.0-1043.46~20.04.1",
"binary_name": "linux-azure-5.8-headers-5.8.0-1043"
},
{
"binary_version": "5.8.0-1043.46~20.04.1",
"binary_name": "linux-azure-5.8-tools-5.8.0-1043"
},
{
"binary_version": "5.8.0-1043.46~20.04.1",
"binary_name": "linux-buildinfo-5.8.0-1043-azure"
},
{
"binary_version": "5.8.0-1043.46~20.04.1",
"binary_name": "linux-cloud-tools-5.8.0-1043-azure"
},
{
"binary_version": "5.8.0-1043.46~20.04.1",
"binary_name": "linux-headers-5.8.0-1043-azure"
},
{
"binary_version": "5.8.0-1043.46~20.04.1",
"binary_name": "linux-image-unsigned-5.8.0-1043-azure"
},
{
"binary_version": "5.8.0-1043.46~20.04.1",
"binary_name": "linux-modules-5.8.0-1043-azure"
},
{
"binary_version": "5.8.0-1043.46~20.04.1",
"binary_name": "linux-modules-extra-5.8.0-1043-azure"
},
{
"binary_version": "5.8.0-1043.46~20.04.1",
"binary_name": "linux-tools-5.8.0-1043-azure"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.4.0-1103.109+cvm1.1",
"binary_name": "linux-image-unsigned-5.4.0-1103-azure-fde"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.11.0-1029.33~20.04.3",
"binary_name": "linux-buildinfo-5.11.0-1029-gcp"
},
{
"binary_version": "5.11.0-1029.33~20.04.3",
"binary_name": "linux-gcp-5.11-headers-5.11.0-1029"
},
{
"binary_version": "5.11.0-1029.33~20.04.3",
"binary_name": "linux-gcp-5.11-tools-5.11.0-1029"
},
{
"binary_version": "5.11.0-1029.33~20.04.3",
"binary_name": "linux-headers-5.11.0-1029-gcp"
},
{
"binary_version": "5.11.0-1029.33~20.04.3",
"binary_name": "linux-image-unsigned-5.11.0-1029-gcp"
},
{
"binary_version": "5.11.0-1029.33~20.04.3",
"binary_name": "linux-modules-5.11.0-1029-gcp"
},
{
"binary_version": "5.11.0-1029.33~20.04.3",
"binary_name": "linux-modules-extra-5.11.0-1029-gcp"
},
{
"binary_version": "5.11.0-1029.33~20.04.3",
"binary_name": "linux-tools-5.11.0-1029-gcp"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.13.0-1033.40~20.04.1",
"binary_name": "linux-buildinfo-5.13.0-1033-gcp"
},
{
"binary_version": "5.13.0-1033.40~20.04.1",
"binary_name": "linux-gcp-5.13-headers-5.13.0-1033"
},
{
"binary_version": "5.13.0-1033.40~20.04.1",
"binary_name": "linux-gcp-5.13-tools-5.13.0-1033"
},
{
"binary_version": "5.13.0-1033.40~20.04.1",
"binary_name": "linux-headers-5.13.0-1033-gcp"
},
{
"binary_version": "5.13.0-1033.40~20.04.1",
"binary_name": "linux-image-unsigned-5.13.0-1033-gcp"
},
{
"binary_version": "5.13.0-1033.40~20.04.1",
"binary_name": "linux-modules-5.13.0-1033-gcp"
},
{
"binary_version": "5.13.0-1033.40~20.04.1",
"binary_name": "linux-modules-extra-5.13.0-1033-gcp"
},
{
"binary_version": "5.13.0-1033.40~20.04.1",
"binary_name": "linux-tools-5.13.0-1033-gcp"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.8.0-1039.41",
"binary_name": "linux-buildinfo-5.8.0-1039-gcp"
},
{
"binary_version": "5.8.0-1039.41",
"binary_name": "linux-gcp-5.8-headers-5.8.0-1039"
},
{
"binary_version": "5.8.0-1039.41",
"binary_name": "linux-gcp-5.8-tools-5.8.0-1039"
},
{
"binary_version": "5.8.0-1039.41",
"binary_name": "linux-headers-5.8.0-1039-gcp"
},
{
"binary_version": "5.8.0-1039.41",
"binary_name": "linux-image-unsigned-5.8.0-1039-gcp"
},
{
"binary_version": "5.8.0-1039.41",
"binary_name": "linux-modules-5.8.0-1039-gcp"
},
{
"binary_version": "5.8.0-1039.41",
"binary_name": "linux-modules-extra-5.8.0-1039-gcp"
},
{
"binary_version": "5.8.0-1039.41",
"binary_name": "linux-tools-5.8.0-1039-gcp"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.4.0-1105.112",
"binary_name": "linux-buildinfo-5.4.0-1105-gke"
},
{
"binary_version": "5.4.0-1105.112",
"binary_name": "linux-gke-headers-5.4.0-1105"
},
{
"binary_version": "5.4.0-1105.112",
"binary_name": "linux-gke-tools-5.4.0-1105"
},
{
"binary_version": "5.4.0-1105.112",
"binary_name": "linux-headers-5.4.0-1105-gke"
},
{
"binary_version": "5.4.0-1105.112",
"binary_name": "linux-image-unsigned-5.4.0-1105-gke"
},
{
"binary_version": "5.4.0-1105.112",
"binary_name": "linux-modules-5.4.0-1105-gke"
},
{
"binary_version": "5.4.0-1105.112",
"binary_name": "linux-modules-extra-5.4.0-1105-gke"
},
{
"binary_version": "5.4.0-1105.112",
"binary_name": "linux-tools-5.4.0-1105-gke"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.15.0-1039.44~20.04.1",
"binary_name": "linux-buildinfo-5.15.0-1039-gke"
},
{
"binary_version": "5.15.0-1039.44~20.04.1",
"binary_name": "linux-gke-5.15-headers-5.15.0-1039"
},
{
"binary_version": "5.15.0-1039.44~20.04.1",
"binary_name": "linux-gke-5.15-tools-5.15.0-1039"
},
{
"binary_version": "5.15.0-1039.44~20.04.1",
"binary_name": "linux-headers-5.15.0-1039-gke"
},
{
"binary_version": "5.15.0-1039.44~20.04.1",
"binary_name": "linux-image-unsigned-5.15.0-1039-gke"
},
{
"binary_version": "5.15.0-1039.44~20.04.1",
"binary_name": "linux-modules-5.15.0-1039-gke"
},
{
"binary_version": "5.15.0-1039.44~20.04.1",
"binary_name": "linux-modules-extra-5.15.0-1039-gke"
},
{
"binary_version": "5.15.0-1039.44~20.04.1",
"binary_name": "linux-modules-iwlwifi-5.15.0-1039-gke"
},
{
"binary_version": "5.15.0-1039.44~20.04.1",
"binary_name": "linux-tools-5.15.0-1039-gke"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.4.0-1102.106",
"binary_name": "linux-buildinfo-5.4.0-1102-gkeop"
},
{
"binary_version": "5.4.0-1102.106",
"binary_name": "linux-cloud-tools-5.4.0-1102-gkeop"
},
{
"binary_version": "5.4.0-1102.106",
"binary_name": "linux-gkeop-cloud-tools-5.4.0-1102"
},
{
"binary_version": "5.4.0-1102.106",
"binary_name": "linux-gkeop-headers-5.4.0-1102"
},
{
"binary_version": "5.4.0-1102.106",
"binary_name": "linux-gkeop-source-5.4.0"
},
{
"binary_version": "5.4.0-1102.106",
"binary_name": "linux-gkeop-tools-5.4.0-1102"
},
{
"binary_version": "5.4.0-1102.106",
"binary_name": "linux-headers-5.4.0-1102-gkeop"
},
{
"binary_version": "5.4.0-1102.106",
"binary_name": "linux-image-unsigned-5.4.0-1102-gkeop"
},
{
"binary_version": "5.4.0-1102.106",
"binary_name": "linux-modules-5.4.0-1102-gkeop"
},
{
"binary_version": "5.4.0-1102.106",
"binary_name": "linux-modules-extra-5.4.0-1102-gkeop"
},
{
"binary_version": "5.4.0-1102.106",
"binary_name": "linux-tools-5.4.0-1102-gkeop"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.15.0-1055.62~20.04.1",
"binary_name": "linux-buildinfo-5.15.0-1055-gkeop"
},
{
"binary_version": "5.15.0-1055.62~20.04.1",
"binary_name": "linux-cloud-tools-5.15.0-1055-gkeop"
},
{
"binary_version": "5.15.0-1055.62~20.04.1",
"binary_name": "linux-gkeop-5.15-cloud-tools-5.15.0-1055"
},
{
"binary_version": "5.15.0-1055.62~20.04.1",
"binary_name": "linux-gkeop-5.15-headers-5.15.0-1055"
},
{
"binary_version": "5.15.0-1055.62~20.04.1",
"binary_name": "linux-gkeop-5.15-tools-5.15.0-1055"
},
{
"binary_version": "5.15.0-1055.62~20.04.1",
"binary_name": "linux-headers-5.15.0-1055-gkeop"
},
{
"binary_version": "5.15.0-1055.62~20.04.1",
"binary_name": "linux-image-unsigned-5.15.0-1055-gkeop"
},
{
"binary_version": "5.15.0-1055.62~20.04.1",
"binary_name": "linux-modules-5.15.0-1055-gkeop"
},
{
"binary_version": "5.15.0-1055.62~20.04.1",
"binary_name": "linux-modules-extra-5.15.0-1055-gkeop"
},
{
"binary_version": "5.15.0-1055.62~20.04.1",
"binary_name": "linux-tools-5.15.0-1055-gkeop"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "block-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "block-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "block-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "crypto-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "crypto-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "crypto-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "dasd-extra-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "dasd-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "fat-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "fat-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "fat-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "fb-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "firewire-core-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "floppy-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "fs-core-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "fs-core-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "fs-core-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "fs-secondary-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "fs-secondary-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "fs-secondary-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "input-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "input-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "input-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "ipmi-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "ipmi-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "ipmi-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "kernel-image-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "kernel-image-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "kernel-image-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-buildinfo-5.11.0-46-generic"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-buildinfo-5.11.0-46-generic-64k"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-buildinfo-5.11.0-46-generic-lpae"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-buildinfo-5.11.0-46-lowlatency"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-cloud-tools-5.11.0-46-generic"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-cloud-tools-5.11.0-46-lowlatency"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-headers-5.11.0-46-generic"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-headers-5.11.0-46-generic-64k"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-headers-5.11.0-46-generic-lpae"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-headers-5.11.0-46-lowlatency"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-hwe-5.11-cloud-tools-5.11.0-46"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-hwe-5.11-cloud-tools-common"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-hwe-5.11-headers-5.11.0-46"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-hwe-5.11-source-5.11.0"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-hwe-5.11-tools-5.11.0-46"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-hwe-5.11-tools-common"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-hwe-5.11-tools-host"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-hwe-5.11-udebs-generic"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-hwe-5.11-udebs-generic-64k"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-hwe-5.11-udebs-generic-lpae"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-image-5.11.0-46-generic"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-image-5.11.0-46-generic-lpae"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-image-unsigned-5.11.0-46-generic"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-image-unsigned-5.11.0-46-generic-64k"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-image-unsigned-5.11.0-46-lowlatency"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-modules-5.11.0-46-generic"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-modules-5.11.0-46-generic-64k"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-modules-5.11.0-46-generic-lpae"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-modules-5.11.0-46-lowlatency"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-modules-extra-5.11.0-46-generic"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-tools-5.11.0-46-generic"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-tools-5.11.0-46-generic-64k"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-tools-5.11.0-46-generic-lpae"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-tools-5.11.0-46-lowlatency"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "md-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "md-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "md-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "message-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "message-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "mouse-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "mouse-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "mouse-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "multipath-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "multipath-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "multipath-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "nfs-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "nfs-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "nfs-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "nic-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "nic-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "nic-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "nic-pcmcia-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "nic-shared-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "nic-shared-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "nic-shared-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "nic-usb-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "nic-usb-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "nic-usb-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "parport-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "parport-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "parport-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "pata-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "pcmcia-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "pcmcia-storage-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "plip-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "plip-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "plip-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "ppp-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "ppp-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "ppp-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "sata-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "sata-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "sata-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "scsi-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "scsi-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "scsi-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "serial-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "storage-core-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "storage-core-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "storage-core-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "usb-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "usb-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "usb-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "virtio-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "virtio-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "vlan-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "vlan-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "vlan-modules-5.11.0-46-generic-lpae-di"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "block-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "block-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "block-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "crypto-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "crypto-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "crypto-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "dasd-extra-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "dasd-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "fat-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "fat-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "fat-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "fb-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "firewire-core-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "floppy-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "fs-core-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "fs-core-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "fs-core-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "fs-secondary-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "fs-secondary-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "fs-secondary-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "input-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "input-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "input-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "ipmi-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "ipmi-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "ipmi-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "kernel-image-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "kernel-image-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "kernel-image-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-buildinfo-5.13.0-52-generic"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-buildinfo-5.13.0-52-generic-64k"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-buildinfo-5.13.0-52-generic-lpae"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-buildinfo-5.13.0-52-lowlatency"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-cloud-tools-5.13.0-52-generic"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-cloud-tools-5.13.0-52-lowlatency"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-headers-5.13.0-52-generic"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-headers-5.13.0-52-generic-64k"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-headers-5.13.0-52-generic-lpae"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-headers-5.13.0-52-lowlatency"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-hwe-5.13-cloud-tools-5.13.0-52"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-hwe-5.13-cloud-tools-common"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-hwe-5.13-headers-5.13.0-52"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-hwe-5.13-source-5.13.0"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-hwe-5.13-tools-5.13.0-52"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-hwe-5.13-tools-common"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-hwe-5.13-tools-host"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-hwe-5.13-udebs-generic"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-hwe-5.13-udebs-generic-64k"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-hwe-5.13-udebs-generic-lpae"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-image-5.13.0-52-generic"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-image-5.13.0-52-generic-lpae"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-image-unsigned-5.13.0-52-generic"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-image-unsigned-5.13.0-52-generic-64k"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-image-unsigned-5.13.0-52-lowlatency"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-modules-5.13.0-52-generic"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-modules-5.13.0-52-generic-64k"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-modules-5.13.0-52-generic-lpae"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-modules-5.13.0-52-lowlatency"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-modules-extra-5.13.0-52-generic"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-tools-5.13.0-52-generic"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-tools-5.13.0-52-generic-64k"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-tools-5.13.0-52-generic-lpae"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-tools-5.13.0-52-lowlatency"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "md-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "md-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "md-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "message-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "message-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "mouse-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "mouse-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "mouse-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "multipath-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "multipath-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "multipath-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "nfs-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "nfs-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "nfs-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "nic-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "nic-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "nic-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "nic-pcmcia-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "nic-shared-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "nic-shared-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "nic-shared-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "nic-usb-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "nic-usb-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "nic-usb-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "parport-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "parport-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "parport-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "pata-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "pcmcia-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "pcmcia-storage-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "plip-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "plip-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "plip-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "ppp-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "ppp-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "ppp-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "sata-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "sata-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "sata-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "scsi-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "scsi-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "scsi-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "serial-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "storage-core-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "storage-core-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "storage-core-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "usb-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "usb-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "usb-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "virtio-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "virtio-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "vlan-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "vlan-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "vlan-modules-5.13.0-52-generic-lpae-di"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "block-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "block-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "block-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "crypto-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "crypto-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "crypto-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "dasd-extra-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "dasd-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "fat-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "fat-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "fat-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "fb-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "firewire-core-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "floppy-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "fs-core-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "fs-core-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "fs-core-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "fs-secondary-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "fs-secondary-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "fs-secondary-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "input-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "input-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "input-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "ipmi-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "ipmi-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "ipmi-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "kernel-image-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "kernel-image-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "kernel-image-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-buildinfo-5.8.0-63-generic"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-buildinfo-5.8.0-63-generic-64k"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-buildinfo-5.8.0-63-generic-lpae"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-buildinfo-5.8.0-63-lowlatency"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-cloud-tools-5.8.0-63-generic"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-cloud-tools-5.8.0-63-lowlatency"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-headers-5.8.0-63-generic"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-headers-5.8.0-63-generic-64k"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-headers-5.8.0-63-generic-lpae"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-headers-5.8.0-63-lowlatency"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-hwe-5.8-cloud-tools-5.8.0-63"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-hwe-5.8-cloud-tools-common"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-hwe-5.8-headers-5.8.0-63"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-hwe-5.8-source-5.8.0"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-hwe-5.8-tools-5.8.0-63"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-hwe-5.8-tools-common"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-hwe-5.8-tools-host"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-hwe-5.8-udebs-generic"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-hwe-5.8-udebs-generic-64k"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-hwe-5.8-udebs-generic-lpae"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-image-5.8.0-63-generic"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-image-5.8.0-63-generic-lpae"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-image-unsigned-5.8.0-63-generic"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-image-unsigned-5.8.0-63-generic-64k"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-image-unsigned-5.8.0-63-lowlatency"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-modules-5.8.0-63-generic"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-modules-5.8.0-63-generic-64k"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-modules-5.8.0-63-generic-lpae"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-modules-5.8.0-63-lowlatency"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-modules-extra-5.8.0-63-generic"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-tools-5.8.0-63-generic"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-tools-5.8.0-63-generic-64k"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-tools-5.8.0-63-generic-lpae"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-tools-5.8.0-63-lowlatency"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "md-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "md-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "md-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "message-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "message-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "mouse-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "mouse-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "mouse-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "multipath-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "multipath-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "multipath-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "nfs-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "nfs-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "nfs-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "nic-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "nic-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "nic-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "nic-pcmcia-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "nic-shared-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "nic-shared-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "nic-shared-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "nic-usb-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "nic-usb-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "nic-usb-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "parport-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "parport-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "parport-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "pata-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "pcmcia-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "pcmcia-storage-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "plip-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "plip-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "plip-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "ppp-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "ppp-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "ppp-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "sata-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "sata-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "sata-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "scsi-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "scsi-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "scsi-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "serial-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "storage-core-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "storage-core-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "storage-core-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "usb-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "usb-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "usb-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "virtio-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "virtio-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "vlan-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "vlan-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "vlan-modules-5.8.0-63-generic-lpae-di"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-buildinfo-5.13.0-1017-intel"
},
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-cloud-tools-5.13.0-1017-intel"
},
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-headers-5.13.0-1017-intel"
},
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-image-unsigned-5.13.0-1017-intel"
},
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-intel-5.13-cloud-tools-5.13.0-1017"
},
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-intel-5.13-cloud-tools-common"
},
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-intel-5.13-headers-5.13.0-1017"
},
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-intel-5.13-source-5.13.0"
},
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-intel-5.13-tools-5.13.0-1017"
},
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-intel-5.13-tools-common"
},
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-intel-5.13-tools-host"
},
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-modules-5.13.0-1017-intel"
},
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-modules-extra-5.13.0-1017-intel"
},
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-tools-5.13.0-1017-intel"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.10.0-1057.61",
"binary_name": "linux-buildinfo-5.10.0-1057-oem"
},
{
"binary_version": "5.10.0-1057.61",
"binary_name": "linux-headers-5.10.0-1057-oem"
},
{
"binary_version": "5.10.0-1057.61",
"binary_name": "linux-image-unsigned-5.10.0-1057-oem"
},
{
"binary_version": "5.10.0-1057.61",
"binary_name": "linux-modules-5.10.0-1057-oem"
},
{
"binary_version": "5.10.0-1057.61",
"binary_name": "linux-oem-5.10-headers-5.10.0-1057"
},
{
"binary_version": "5.10.0-1057.61",
"binary_name": "linux-oem-5.10-tools-5.10.0-1057"
},
{
"binary_version": "5.10.0-1057.61",
"binary_name": "linux-oem-5.10-tools-host"
},
{
"binary_version": "5.10.0-1057.61",
"binary_name": "linux-tools-5.10.0-1057-oem"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.13.0-1029.36",
"binary_name": "linux-buildinfo-5.13.0-1029-oem"
},
{
"binary_version": "5.13.0-1029.36",
"binary_name": "linux-headers-5.13.0-1029-oem"
},
{
"binary_version": "5.13.0-1029.36",
"binary_name": "linux-image-unsigned-5.13.0-1029-oem"
},
{
"binary_version": "5.13.0-1029.36",
"binary_name": "linux-modules-5.13.0-1029-oem"
},
{
"binary_version": "5.13.0-1029.36",
"binary_name": "linux-oem-5.13-headers-5.13.0-1029"
},
{
"binary_version": "5.13.0-1029.36",
"binary_name": "linux-oem-5.13-tools-5.13.0-1029"
},
{
"binary_version": "5.13.0-1029.36",
"binary_name": "linux-oem-5.13-tools-host"
},
{
"binary_version": "5.13.0-1029.36",
"binary_name": "linux-tools-5.13.0-1029-oem"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.14.0-1059.67",
"binary_name": "linux-buildinfo-5.14.0-1059-oem"
},
{
"binary_version": "5.14.0-1059.67",
"binary_name": "linux-headers-5.14.0-1059-oem"
},
{
"binary_version": "5.14.0-1059.67",
"binary_name": "linux-image-unsigned-5.14.0-1059-oem"
},
{
"binary_version": "5.14.0-1059.67",
"binary_name": "linux-modules-5.14.0-1059-oem"
},
{
"binary_version": "5.14.0-1059.67",
"binary_name": "linux-modules-iwlwifi-5.14.0-1059-oem"
},
{
"binary_version": "5.14.0-1059.67",
"binary_name": "linux-oem-5.14-headers-5.14.0-1059"
},
{
"binary_version": "5.14.0-1059.67",
"binary_name": "linux-oem-5.14-tools-5.14.0-1059"
},
{
"binary_version": "5.14.0-1059.67",
"binary_name": "linux-oem-5.14-tools-host"
},
{
"binary_version": "5.14.0-1059.67",
"binary_name": "linux-tools-5.14.0-1059-oem"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.6.0-1056.60",
"binary_name": "linux-buildinfo-5.6.0-1056-oem"
},
{
"binary_version": "5.6.0-1056.60",
"binary_name": "linux-headers-5.6.0-1056-oem"
},
{
"binary_version": "5.6.0-1056.60",
"binary_name": "linux-image-unsigned-5.6.0-1056-oem"
},
{
"binary_version": "5.6.0-1056.60",
"binary_name": "linux-modules-5.6.0-1056-oem"
},
{
"binary_version": "5.6.0-1056.60",
"binary_name": "linux-oem-5.6-headers-5.6.0-1056"
},
{
"binary_version": "5.6.0-1056.60",
"binary_name": "linux-oem-5.6-tools-5.6.0-1056"
},
{
"binary_version": "5.6.0-1056.60",
"binary_name": "linux-oem-5.6-tools-host"
},
{
"binary_version": "5.6.0-1056.60",
"binary_name": "linux-tools-5.6.0-1056-oem"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-buildinfo-5.11.0-1028-oracle"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-headers-5.11.0-1028-oracle"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-image-unsigned-5.11.0-1028-oracle"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-modules-5.11.0-1028-oracle"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-modules-extra-5.11.0-1028-oracle"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-oracle-5.11-headers-5.11.0-1028"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-oracle-5.11-tools-5.11.0-1028"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-tools-5.11.0-1028-oracle"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.13.0-1036.43~20.04.1",
"binary_name": "linux-buildinfo-5.13.0-1036-oracle"
},
{
"binary_version": "5.13.0-1036.43~20.04.1",
"binary_name": "linux-headers-5.13.0-1036-oracle"
},
{
"binary_version": "5.13.0-1036.43~20.04.1",
"binary_name": "linux-image-unsigned-5.13.0-1036-oracle"
},
{
"binary_version": "5.13.0-1036.43~20.04.1",
"binary_name": "linux-modules-5.13.0-1036-oracle"
},
{
"binary_version": "5.13.0-1036.43~20.04.1",
"binary_name": "linux-modules-extra-5.13.0-1036-oracle"
},
{
"binary_version": "5.13.0-1036.43~20.04.1",
"binary_name": "linux-oracle-5.13-headers-5.13.0-1036"
},
{
"binary_version": "5.13.0-1036.43~20.04.1",
"binary_name": "linux-oracle-5.13-tools-5.13.0-1036"
},
{
"binary_version": "5.13.0-1036.43~20.04.1",
"binary_name": "linux-tools-5.13.0-1036-oracle"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.8.0-1038.39~20.04.1",
"binary_name": "linux-buildinfo-5.8.0-1038-oracle"
},
{
"binary_version": "5.8.0-1038.39~20.04.1",
"binary_name": "linux-headers-5.8.0-1038-oracle"
},
{
"binary_version": "5.8.0-1038.39~20.04.1",
"binary_name": "linux-image-unsigned-5.8.0-1038-oracle"
},
{
"binary_version": "5.8.0-1038.39~20.04.1",
"binary_name": "linux-modules-5.8.0-1038-oracle"
},
{
"binary_version": "5.8.0-1038.39~20.04.1",
"binary_name": "linux-modules-extra-5.8.0-1038-oracle"
},
{
"binary_version": "5.8.0-1038.39~20.04.1",
"binary_name": "linux-oracle-5.8-headers-5.8.0-1038"
},
{
"binary_version": "5.8.0-1038.39~20.04.1",
"binary_name": "linux-oracle-5.8-tools-5.8.0-1038"
},
{
"binary_version": "5.8.0-1038.39~20.04.1",
"binary_name": "linux-tools-5.8.0-1038-oracle"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.4.0-1006.6",
"binary_name": "linux-buildinfo-5.4.0-1006-raspi2"
},
{
"binary_version": "5.4.0-1006.6",
"binary_name": "linux-headers-5.4.0-1006-raspi2"
},
{
"binary_version": "5.4.0-1006.6",
"binary_name": "linux-image-5.4.0-1006-raspi2"
},
{
"binary_version": "5.4.0-1006.6",
"binary_name": "linux-modules-5.4.0-1006-raspi2"
},
{
"binary_version": "5.4.0-1006.6",
"binary_name": "linux-raspi2-headers-5.4.0-1006"
},
{
"binary_version": "5.4.0-1006.6",
"binary_name": "linux-raspi2-tools-5.4.0-1006"
},
{
"binary_version": "5.4.0-1006.6",
"binary_name": "linux-tools-5.4.0-1006-raspi2"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.4.0-40.45",
"binary_name": "block-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "crypto-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "fat-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "firewire-core-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "fs-core-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "fs-secondary-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "input-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "ipmi-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "kernel-image-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "linux-buildinfo-5.4.0-40-generic"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "linux-headers-5.4.0-40-generic"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "linux-image-5.4.0-40-generic"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "linux-modules-5.4.0-40-generic"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "linux-modules-extra-5.4.0-40-generic"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "linux-riscv-headers-5.4.0-40"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "linux-riscv-tools-5.4.0-40"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "linux-tools-5.4.0-40-generic"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "linux-udebs-generic"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "md-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "message-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "mouse-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "multipath-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "nfs-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "nic-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "nic-shared-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "nic-usb-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "parport-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "pata-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "plip-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "ppp-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "sata-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "scsi-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "storage-core-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "usb-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "virtio-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "vlan-modules-5.4.0-40-generic-di"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.11.0-1031.35",
"binary_name": "linux-buildinfo-5.11.0-1031-generic"
},
{
"binary_version": "5.11.0-1031.35",
"binary_name": "linux-headers-5.11.0-1031-generic"
},
{
"binary_version": "5.11.0-1031.35",
"binary_name": "linux-image-5.11.0-1031-generic"
},
{
"binary_version": "5.11.0-1031.35",
"binary_name": "linux-modules-5.11.0-1031-generic"
},
{
"binary_version": "5.11.0-1031.35",
"binary_name": "linux-modules-extra-5.11.0-1031-generic"
},
{
"binary_version": "5.11.0-1031.35",
"binary_name": "linux-riscv-5.11-headers-5.11.0-1031"
},
{
"binary_version": "5.11.0-1031.35",
"binary_name": "linux-riscv-5.11-tools-5.11.0-1031"
},
{
"binary_version": "5.11.0-1031.35",
"binary_name": "linux-tools-5.11.0-1031-generic"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "block-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "crypto-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "fat-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "firewire-core-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "fs-core-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "fs-secondary-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "input-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "ipmi-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "kernel-image-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "linux-buildinfo-5.8.0-29-generic"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "linux-headers-5.8.0-29-generic"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "linux-image-5.8.0-29-generic"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "linux-modules-5.8.0-29-generic"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "linux-modules-extra-5.8.0-29-generic"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "linux-riscv-5.8-headers-5.8.0-29"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "linux-riscv-5.8-tools-5.8.0-29"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "linux-tools-5.8.0-29-generic"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "linux-udebs-generic"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "md-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "message-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "mouse-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "multipath-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "nfs-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "nic-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "nic-shared-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "nic-usb-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "parport-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "pata-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "plip-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "ppp-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "sata-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "scsi-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "storage-core-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "usb-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "virtio-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "vlan-modules-5.8.0-29-generic-di"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-buildinfo-5.15.0-37-generic"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-buildinfo-5.15.0-37-generic-64k"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-buildinfo-5.15.0-37-generic-lpae"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-cloud-tools-5.15.0-37"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-cloud-tools-5.15.0-37-generic"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-cloud-tools-common"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-headers-5.15.0-37"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-headers-5.15.0-37-generic"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-headers-5.15.0-37-generic-64k"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-headers-5.15.0-37-generic-lpae"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-image-5.15.0-37-generic"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-image-5.15.0-37-generic-lpae"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-image-unsigned-5.15.0-37-generic"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-image-unsigned-5.15.0-37-generic-64k"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-libc-dev"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-modules-5.15.0-37-generic"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-modules-5.15.0-37-generic-64k"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-modules-5.15.0-37-generic-lpae"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-modules-extra-5.15.0-37-generic"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-source-5.15.0"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-tools-5.15.0-37"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-tools-5.15.0-37-generic"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-tools-5.15.0-37-generic-64k"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-tools-5.15.0-37-generic-lpae"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-tools-common"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-tools-host"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.19.0-1015.15~22.04.1",
"binary_name": "linux-allwinner-5.19-headers-5.19.0-1015"
},
{
"binary_version": "5.19.0-1015.15~22.04.1",
"binary_name": "linux-allwinner-5.19-tools-5.19.0-1015"
},
{
"binary_version": "5.19.0-1015.15~22.04.1",
"binary_name": "linux-buildinfo-5.19.0-1015-allwinner"
},
{
"binary_version": "5.19.0-1015.15~22.04.1",
"binary_name": "linux-headers-5.19.0-1015-allwinner"
},
{
"binary_version": "5.19.0-1015.15~22.04.1",
"binary_name": "linux-image-5.19.0-1015-allwinner"
},
{
"binary_version": "5.19.0-1015.15~22.04.1",
"binary_name": "linux-modules-5.19.0-1015-allwinner"
},
{
"binary_version": "5.19.0-1015.15~22.04.1",
"binary_name": "linux-modules-extra-5.19.0-1015-allwinner"
},
{
"binary_version": "5.19.0-1015.15~22.04.1",
"binary_name": "linux-tools-5.19.0-1015-allwinner"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.15.0-1011.14",
"binary_name": "linux-aws-cloud-tools-5.15.0-1011"
},
{
"binary_version": "5.15.0-1011.14",
"binary_name": "linux-aws-headers-5.15.0-1011"
},
{
"binary_version": "5.15.0-1011.14",
"binary_name": "linux-aws-tools-5.15.0-1011"
},
{
"binary_version": "5.15.0-1011.14",
"binary_name": "linux-buildinfo-5.15.0-1011-aws"
},
{
"binary_version": "5.15.0-1011.14",
"binary_name": "linux-cloud-tools-5.15.0-1011-aws"
},
{
"binary_version": "5.15.0-1011.14",
"binary_name": "linux-headers-5.15.0-1011-aws"
},
{
"binary_version": "5.15.0-1011.14",
"binary_name": "linux-image-unsigned-5.15.0-1011-aws"
},
{
"binary_version": "5.15.0-1011.14",
"binary_name": "linux-modules-5.15.0-1011-aws"
},
{
"binary_version": "5.15.0-1011.14",
"binary_name": "linux-modules-extra-5.15.0-1011-aws"
},
{
"binary_version": "5.15.0-1011.14",
"binary_name": "linux-tools-5.15.0-1011-aws"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.19.0-1029.30~22.04.1",
"binary_name": "linux-aws-5.19-cloud-tools-5.19.0-1029"
},
{
"binary_version": "5.19.0-1029.30~22.04.1",
"binary_name": "linux-aws-5.19-headers-5.19.0-1029"
},
{
"binary_version": "5.19.0-1029.30~22.04.1",
"binary_name": "linux-aws-5.19-tools-5.19.0-1029"
},
{
"binary_version": "5.19.0-1029.30~22.04.1",
"binary_name": "linux-buildinfo-5.19.0-1029-aws"
},
{
"binary_version": "5.19.0-1029.30~22.04.1",
"binary_name": "linux-cloud-tools-5.19.0-1029-aws"
},
{
"binary_version": "5.19.0-1029.30~22.04.1",
"binary_name": "linux-headers-5.19.0-1029-aws"
},
{
"binary_version": "5.19.0-1029.30~22.04.1",
"binary_name": "linux-image-unsigned-5.19.0-1029-aws"
},
{
"binary_version": "5.19.0-1029.30~22.04.1",
"binary_name": "linux-modules-5.19.0-1029-aws"
},
{
"binary_version": "5.19.0-1029.30~22.04.1",
"binary_name": "linux-modules-extra-5.19.0-1029-aws"
},
{
"binary_version": "5.19.0-1029.30~22.04.1",
"binary_name": "linux-tools-5.19.0-1029-aws"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-aws-6.2-cloud-tools-6.2.0-1018"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-aws-6.2-headers-6.2.0-1018"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-aws-6.2-tools-6.2.0-1018"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-buildinfo-6.2.0-1018-aws"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-cloud-tools-6.2.0-1018-aws"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-headers-6.2.0-1018-aws"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-image-unsigned-6.2.0-1018-aws"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-modules-6.2.0-1018-aws"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-modules-extra-6.2.0-1018-aws"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-tools-6.2.0-1018-aws"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "6.5.0-1024.24~22.04.1",
"binary_name": "linux-aws-6.5-cloud-tools-6.5.0-1024"
},
{
"binary_version": "6.5.0-1024.24~22.04.1",
"binary_name": "linux-aws-6.5-headers-6.5.0-1024"
},
{
"binary_version": "6.5.0-1024.24~22.04.1",
"binary_name": "linux-aws-6.5-tools-6.5.0-1024"
},
{
"binary_version": "6.5.0-1024.24~22.04.1",
"binary_name": "linux-buildinfo-6.5.0-1024-aws"
},
{
"binary_version": "6.5.0-1024.24~22.04.1",
"binary_name": "linux-cloud-tools-6.5.0-1024-aws"
},
{
"binary_version": "6.5.0-1024.24~22.04.1",
"binary_name": "linux-headers-6.5.0-1024-aws"
},
{
"binary_version": "6.5.0-1024.24~22.04.1",
"binary_name": "linux-image-unsigned-6.5.0-1024-aws"
},
{
"binary_version": "6.5.0-1024.24~22.04.1",
"binary_name": "linux-modules-6.5.0-1024-aws"
},
{
"binary_version": "6.5.0-1024.24~22.04.1",
"binary_name": "linux-modules-extra-6.5.0-1024-aws"
},
{
"binary_version": "6.5.0-1024.24~22.04.1",
"binary_name": "linux-tools-6.5.0-1024-aws"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.15.0-1010.12",
"binary_name": "linux-azure-cloud-tools-5.15.0-1010"
},
{
"binary_version": "5.15.0-1010.12",
"binary_name": "linux-azure-headers-5.15.0-1010"
},
{
"binary_version": "5.15.0-1010.12",
"binary_name": "linux-azure-tools-5.15.0-1010"
},
{
"binary_version": "5.15.0-1010.12",
"binary_name": "linux-buildinfo-5.15.0-1010-azure"
},
{
"binary_version": "5.15.0-1010.12",
"binary_name": "linux-cloud-tools-5.15.0-1010-azure"
},
{
"binary_version": "5.15.0-1010.12",
"binary_name": "linux-headers-5.15.0-1010-azure"
},
{
"binary_version": "5.15.0-1010.12",
"binary_name": "linux-image-unsigned-5.15.0-1010-azure"
},
{
"binary_version": "5.15.0-1010.12",
"binary_name": "linux-modules-5.15.0-1010-azure"
},
{
"binary_version": "5.15.0-1010.12",
"binary_name": "linux-modules-extra-5.15.0-1010-azure"
},
{
"binary_version": "5.15.0-1010.12",
"binary_name": "linux-tools-5.15.0-1010-azure"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.19.0-1027.30~22.04.2",
"binary_name": "linux-azure-5.19-cloud-tools-5.19.0-1027"
},
{
"binary_version": "5.19.0-1027.30~22.04.2",
"binary_name": "linux-azure-5.19-headers-5.19.0-1027"
},
{
"binary_version": "5.19.0-1027.30~22.04.2",
"binary_name": "linux-azure-5.19-tools-5.19.0-1027"
},
{
"binary_version": "5.19.0-1027.30~22.04.2",
"binary_name": "linux-buildinfo-5.19.0-1027-azure"
},
{
"binary_version": "5.19.0-1027.30~22.04.2",
"binary_name": "linux-cloud-tools-5.19.0-1027-azure"
},
{
"binary_version": "5.19.0-1027.30~22.04.2",
"binary_name": "linux-headers-5.19.0-1027-azure"
},
{
"binary_version": "5.19.0-1027.30~22.04.2",
"binary_name": "linux-image-unsigned-5.19.0-1027-azure"
},
{
"binary_version": "5.19.0-1027.30~22.04.2",
"binary_name": "linux-modules-5.19.0-1027-azure"
},
{
"binary_version": "5.19.0-1027.30~22.04.2",
"binary_name": "linux-modules-extra-5.19.0-1027-azure"
},
{
"binary_version": "5.19.0-1027.30~22.04.2",
"binary_name": "linux-tools-5.19.0-1027-azure"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "6.2.0-1019.19~22.04.1",
"binary_name": "linux-azure-6.2-cloud-tools-6.2.0-1019"
},
{
"binary_version": "6.2.0-1019.19~22.04.1",
"binary_name": "linux-azure-6.2-headers-6.2.0-1019"
},
{
"binary_version": "6.2.0-1019.19~22.04.1",
"binary_name": "linux-azure-6.2-tools-6.2.0-1019"
},
{
"binary_version": "6.2.0-1019.19~22.04.1",
"binary_name": "linux-buildinfo-6.2.0-1019-azure"
},
{
"binary_version": "6.2.0-1019.19~22.04.1",
"binary_name": "linux-cloud-tools-6.2.0-1019-azure"
},
{
"binary_version": "6.2.0-1019.19~22.04.1",
"binary_name": "linux-headers-6.2.0-1019-azure"
},
{
"binary_version": "6.2.0-1019.19~22.04.1",
"binary_name": "linux-image-unsigned-6.2.0-1019-azure"
},
{
"binary_version": "6.2.0-1019.19~22.04.1",
"binary_name": "linux-modules-6.2.0-1019-azure"
},
{
"binary_version": "6.2.0-1019.19~22.04.1",
"binary_name": "linux-modules-extra-6.2.0-1019-azure"
},
{
"binary_version": "6.2.0-1019.19~22.04.1",
"binary_name": "linux-tools-6.2.0-1019-azure"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "6.5.0-1025.26~22.04.1",
"binary_name": "linux-azure-6.5-cloud-tools-6.5.0-1025"
},
{
"binary_version": "6.5.0-1025.26~22.04.1",
"binary_name": "linux-azure-6.5-headers-6.5.0-1025"
},
{
"binary_version": "6.5.0-1025.26~22.04.1",
"binary_name": "linux-azure-6.5-tools-6.5.0-1025"
},
{
"binary_version": "6.5.0-1025.26~22.04.1",
"binary_name": "linux-buildinfo-6.5.0-1025-azure"
},
{
"binary_version": "6.5.0-1025.26~22.04.1",
"binary_name": "linux-cloud-tools-6.5.0-1025-azure"
},
{
"binary_version": "6.5.0-1025.26~22.04.1",
"binary_name": "linux-headers-6.5.0-1025-azure"
},
{
"binary_version": "6.5.0-1025.26~22.04.1",
"binary_name": "linux-image-unsigned-6.5.0-1025-azure"
},
{
"binary_version": "6.5.0-1025.26~22.04.1",
"binary_name": "linux-modules-6.5.0-1025-azure"
},
{
"binary_version": "6.5.0-1025.26~22.04.1",
"binary_name": "linux-modules-extra-6.5.0-1025-azure"
},
{
"binary_version": "6.5.0-1025.26~22.04.1",
"binary_name": "linux-tools-6.5.0-1025-azure"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.19.0-1027.30~22.04.2.1",
"binary_name": "linux-image-unsigned-5.19.0-1027-azure-fde"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "6.2.0-1019.19~22.04.1.1",
"binary_name": "linux-image-unsigned-6.2.0-1019-azure-fde"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.15.0-1008.12",
"binary_name": "linux-buildinfo-5.15.0-1008-gcp"
},
{
"binary_version": "5.15.0-1008.12",
"binary_name": "linux-gcp-headers-5.15.0-1008"
},
{
"binary_version": "5.15.0-1008.12",
"binary_name": "linux-gcp-tools-5.15.0-1008"
},
{
"binary_version": "5.15.0-1008.12",
"binary_name": "linux-headers-5.15.0-1008-gcp"
},
{
"binary_version": "5.15.0-1008.12",
"binary_name": "linux-image-unsigned-5.15.0-1008-gcp"
},
{
"binary_version": "5.15.0-1008.12",
"binary_name": "linux-modules-5.15.0-1008-gcp"
},
{
"binary_version": "5.15.0-1008.12",
"binary_name": "linux-modules-extra-5.15.0-1008-gcp"
},
{
"binary_version": "5.15.0-1008.12",
"binary_name": "linux-tools-5.15.0-1008-gcp"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.19.0-1030.32~22.04.1",
"binary_name": "linux-buildinfo-5.19.0-1030-gcp"
},
{
"binary_version": "5.19.0-1030.32~22.04.1",
"binary_name": "linux-gcp-5.19-headers-5.19.0-1030"
},
{
"binary_version": "5.19.0-1030.32~22.04.1",
"binary_name": "linux-gcp-5.19-tools-5.19.0-1030"
},
{
"binary_version": "5.19.0-1030.32~22.04.1",
"binary_name": "linux-headers-5.19.0-1030-gcp"
},
{
"binary_version": "5.19.0-1030.32~22.04.1",
"binary_name": "linux-image-unsigned-5.19.0-1030-gcp"
},
{
"binary_version": "5.19.0-1030.32~22.04.1",
"binary_name": "linux-modules-5.19.0-1030-gcp"
},
{
"binary_version": "5.19.0-1030.32~22.04.1",
"binary_name": "linux-modules-extra-5.19.0-1030-gcp"
},
{
"binary_version": "5.19.0-1030.32~22.04.1",
"binary_name": "linux-tools-5.19.0-1030-gcp"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "6.2.0-1021.23~22.04.1",
"binary_name": "linux-buildinfo-6.2.0-1021-gcp"
},
{
"binary_version": "6.2.0-1021.23~22.04.1",
"binary_name": "linux-gcp-6.2-headers-6.2.0-1021"
},
{
"binary_version": "6.2.0-1021.23~22.04.1",
"binary_name": "linux-gcp-6.2-tools-6.2.0-1021"
},
{
"binary_version": "6.2.0-1021.23~22.04.1",
"binary_name": "linux-headers-6.2.0-1021-gcp"
},
{
"binary_version": "6.2.0-1021.23~22.04.1",
"binary_name": "linux-image-unsigned-6.2.0-1021-gcp"
},
{
"binary_version": "6.2.0-1021.23~22.04.1",
"binary_name": "linux-modules-6.2.0-1021-gcp"
},
{
"binary_version": "6.2.0-1021.23~22.04.1",
"binary_name": "linux-modules-extra-6.2.0-1021-gcp"
},
{
"binary_version": "6.2.0-1021.23~22.04.1",
"binary_name": "linux-tools-6.2.0-1021-gcp"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "6.5.0-1025.27~22.04.1",
"binary_name": "linux-buildinfo-6.5.0-1025-gcp"
},
{
"binary_version": "6.5.0-1025.27~22.04.1",
"binary_name": "linux-gcp-6.5-headers-6.5.0-1025"
},
{
"binary_version": "6.5.0-1025.27~22.04.1",
"binary_name": "linux-gcp-6.5-tools-6.5.0-1025"
},
{
"binary_version": "6.5.0-1025.27~22.04.1",
"binary_name": "linux-headers-6.5.0-1025-gcp"
},
{
"binary_version": "6.5.0-1025.27~22.04.1",
"binary_name": "linux-image-unsigned-6.5.0-1025-gcp"
},
{
"binary_version": "6.5.0-1025.27~22.04.1",
"binary_name": "linux-modules-6.5.0-1025-gcp"
},
{
"binary_version": "6.5.0-1025.27~22.04.1",
"binary_name": "linux-modules-extra-6.5.0-1025-gcp"
},
{
"binary_version": "6.5.0-1025.27~22.04.1",
"binary_name": "linux-modules-iwlwifi-6.5.0-1025-gcp"
},
{
"binary_version": "6.5.0-1025.27~22.04.1",
"binary_name": "linux-tools-6.5.0-1025-gcp"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.15.0-1008.10",
"binary_name": "linux-buildinfo-5.15.0-1008-gke"
},
{
"binary_version": "5.15.0-1008.10",
"binary_name": "linux-gke-headers-5.15.0-1008"
},
{
"binary_version": "5.15.0-1008.10",
"binary_name": "linux-gke-tools-5.15.0-1008"
},
{
"binary_version": "5.15.0-1008.10",
"binary_name": "linux-headers-5.15.0-1008-gke"
},
{
"binary_version": "5.15.0-1008.10",
"binary_name": "linux-image-unsigned-5.15.0-1008-gke"
},
{
"binary_version": "5.15.0-1008.10",
"binary_name": "linux-modules-5.15.0-1008-gke"
},
{
"binary_version": "5.15.0-1008.10",
"binary_name": "linux-modules-extra-5.15.0-1008-gke"
},
{
"binary_version": "5.15.0-1008.10",
"binary_name": "linux-tools-5.15.0-1008-gke"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-buildinfo-5.19.0-50-generic"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-buildinfo-5.19.0-50-generic-64k"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-buildinfo-5.19.0-50-generic-lpae"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-cloud-tools-5.19.0-50-generic"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-headers-5.19.0-50-generic"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-headers-5.19.0-50-generic-64k"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-headers-5.19.0-50-generic-lpae"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-hwe-5.19-cloud-tools-5.19.0-50"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-hwe-5.19-cloud-tools-common"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-hwe-5.19-headers-5.19.0-50"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-hwe-5.19-tools-5.19.0-50"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-hwe-5.19-tools-common"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-hwe-5.19-tools-host"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-image-5.19.0-50-generic"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-image-5.19.0-50-generic-lpae"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-image-unsigned-5.19.0-50-generic"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-image-unsigned-5.19.0-50-generic-64k"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-modules-5.19.0-50-generic"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-modules-5.19.0-50-generic-64k"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-modules-5.19.0-50-generic-lpae"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-modules-extra-5.19.0-50-generic"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-modules-ipu6-5.19.0-50-generic"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-modules-ivsc-5.19.0-50-generic"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-modules-iwlwifi-5.19.0-50-generic"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-source-5.19.0"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-tools-5.19.0-50-generic"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-tools-5.19.0-50-generic-64k"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-tools-5.19.0-50-generic-lpae"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-buildinfo-6.2.0-39-generic"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-buildinfo-6.2.0-39-generic-64k"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-buildinfo-6.2.0-39-generic-lpae"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-cloud-tools-6.2.0-39-generic"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-headers-6.2.0-39-generic"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-headers-6.2.0-39-generic-64k"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-headers-6.2.0-39-generic-lpae"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-hwe-6.2-cloud-tools-6.2.0-39"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-hwe-6.2-cloud-tools-common"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-hwe-6.2-headers-6.2.0-39"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-hwe-6.2-tools-6.2.0-39"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-hwe-6.2-tools-common"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-hwe-6.2-tools-host"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-image-6.2.0-39-generic"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-image-6.2.0-39-generic-lpae"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-image-unsigned-6.2.0-39-generic"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-image-unsigned-6.2.0-39-generic-64k"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-modules-6.2.0-39-generic"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-modules-6.2.0-39-generic-64k"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-modules-6.2.0-39-generic-lpae"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-modules-extra-6.2.0-39-generic"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-modules-ipu6-6.2.0-39-generic"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-modules-ivsc-6.2.0-39-generic"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-modules-iwlwifi-6.2.0-39-generic"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-source-6.2.0"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-tools-6.2.0-39-generic"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-tools-6.2.0-39-generic-64k"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-tools-6.2.0-39-generic-lpae"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-buildinfo-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-buildinfo-6.5.0-45-generic-64k"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-cloud-tools-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-headers-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-headers-6.5.0-45-generic-64k"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-hwe-6.5-cloud-tools-6.5.0-45"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-hwe-6.5-cloud-tools-common"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-hwe-6.5-headers-6.5.0-45"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-hwe-6.5-tools-6.5.0-45"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-hwe-6.5-tools-common"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-hwe-6.5-tools-host"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-image-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-image-unsigned-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-image-unsigned-6.5.0-45-generic-64k"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-modules-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-modules-6.5.0-45-generic-64k"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-modules-extra-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-modules-ipu6-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-modules-ivsc-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-modules-iwlwifi-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-source-6.5.0"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-tools-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-tools-6.5.0-45-generic-64k"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.15.0-1007.8",
"binary_name": "linux-buildinfo-5.15.0-1007-ibm"
},
{
"binary_version": "5.15.0-1007.8",
"binary_name": "linux-headers-5.15.0-1007-ibm"
},
{
"binary_version": "5.15.0-1007.8",
"binary_name": "linux-ibm-cloud-tools-common"
},
{
"binary_version": "5.15.0-1007.8",
"binary_name": "linux-ibm-headers-5.15.0-1007"
},
{
"binary_version": "5.15.0-1007.8",
"binary_name": "linux-ibm-source-5.15.0"
},
{
"binary_version": "5.15.0-1007.8",
"binary_name": "linux-ibm-tools-5.15.0-1007"
},
{
"binary_version": "5.15.0-1007.8",
"binary_name": "linux-ibm-tools-common"
},
{
"binary_version": "5.15.0-1007.8",
"binary_name": "linux-image-unsigned-5.15.0-1007-ibm"
},
{
"binary_version": "5.15.0-1007.8",
"binary_name": "linux-modules-5.15.0-1007-ibm"
},
{
"binary_version": "5.15.0-1007.8",
"binary_name": "linux-modules-extra-5.15.0-1007-ibm"
},
{
"binary_version": "5.15.0-1007.8",
"binary_name": "linux-tools-5.15.0-1007-ibm"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.15.0-1073.75",
"binary_name": "linux-buildinfo-5.15.0-1073-intel-iot-realtime"
},
{
"binary_version": "5.15.0-1073.75",
"binary_name": "linux-cloud-tools-5.15.0-1073-intel-iot-realtime"
},
{
"binary_version": "5.15.0-1073.75",
"binary_name": "linux-headers-5.15.0-1073-intel-iot-realtime"
},
{
"binary_version": "5.15.0-1073.75",
"binary_name": "linux-image-unsigned-5.15.0-1073-intel-iot-realtime"
},
{
"binary_version": "5.15.0-1073.75",
"binary_name": "linux-intel-iot-realtime-cloud-tools-5.15.0-1073"
},
{
"binary_version": "5.15.0-1073.75",
"binary_name": "linux-intel-iot-realtime-cloud-tools-common"
},
{
"binary_version": "5.15.0-1073.75",
"binary_name": "linux-intel-iot-realtime-headers-5.15.0-1073"
},
{
"binary_version": "5.15.0-1073.75",
"binary_name": "linux-intel-iot-realtime-tools-5.15.0-1073"
},
{
"binary_version": "5.15.0-1073.75",
"binary_name": "linux-intel-iot-realtime-tools-common"
},
{
"binary_version": "5.15.0-1073.75",
"binary_name": "linux-intel-iot-realtime-tools-host"
},
{
"binary_version": "5.15.0-1073.75",
"binary_name": "linux-modules-5.15.0-1073-intel-iot-realtime"
},
{
"binary_version": "5.15.0-1073.75",
"binary_name": "linux-modules-extra-5.15.0-1073-intel-iot-realtime"
},
{
"binary_version": "5.15.0-1073.75",
"binary_name": "linux-tools-5.15.0-1073-intel-iot-realtime"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.15.0-1008.11",
"binary_name": "linux-buildinfo-5.15.0-1008-intel-iotg"
},
{
"binary_version": "5.15.0-1008.11",
"binary_name": "linux-cloud-tools-5.15.0-1008-intel-iotg"
},
{
"binary_version": "5.15.0-1008.11",
"binary_name": "linux-headers-5.15.0-1008-intel-iotg"
},
{
"binary_version": "5.15.0-1008.11",
"binary_name": "linux-image-unsigned-5.15.0-1008-intel-iotg"
},
{
"binary_version": "5.15.0-1008.11",
"binary_name": "linux-intel-iotg-cloud-tools-5.15.0-1008"
},
{
"binary_version": "5.15.0-1008.11",
"binary_name": "linux-intel-iotg-cloud-tools-common"
},
{
"binary_version": "5.15.0-1008.11",
"binary_name": "linux-intel-iotg-headers-5.15.0-1008"
},
{
"binary_version": "5.15.0-1008.11",
"binary_name": "linux-intel-iotg-tools-5.15.0-1008"
},
{
"binary_version": "5.15.0-1008.11",
"binary_name": "linux-intel-iotg-tools-common"
},
{
"binary_version": "5.15.0-1008.11",
"binary_name": "linux-intel-iotg-tools-host"
},
{
"binary_version": "5.15.0-1008.11",
"binary_name": "linux-modules-5.15.0-1008-intel-iotg"
},
{
"binary_version": "5.15.0-1008.11",
"binary_name": "linux-modules-extra-5.15.0-1008-intel-iotg"
},
{
"binary_version": "5.15.0-1008.11",
"binary_name": "linux-tools-5.15.0-1008-intel-iotg"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.15.0-1010.11",
"binary_name": "linux-buildinfo-5.15.0-1010-kvm"
},
{
"binary_version": "5.15.0-1010.11",
"binary_name": "linux-headers-5.15.0-1010-kvm"
},
{
"binary_version": "5.15.0-1010.11",
"binary_name": "linux-image-unsigned-5.15.0-1010-kvm"
},
{
"binary_version": "5.15.0-1010.11",
"binary_name": "linux-kvm-headers-5.15.0-1010"
},
{
"binary_version": "5.15.0-1010.11",
"binary_name": "linux-kvm-tools-5.15.0-1010"
},
{
"binary_version": "5.15.0-1010.11",
"binary_name": "linux-modules-5.15.0-1010-kvm"
},
{
"binary_version": "5.15.0-1010.11",
"binary_name": "linux-tools-5.15.0-1010-kvm"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-buildinfo-5.15.0-37-lowlatency"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-buildinfo-5.15.0-37-lowlatency-64k"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-cloud-tools-5.15.0-37-lowlatency"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-headers-5.15.0-37-lowlatency"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-headers-5.15.0-37-lowlatency-64k"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-image-unsigned-5.15.0-37-lowlatency"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-image-unsigned-5.15.0-37-lowlatency-64k"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-lowlatency-cloud-tools-5.15.0-37"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-lowlatency-cloud-tools-common"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-lowlatency-headers-5.15.0-37"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-lowlatency-tools-5.15.0-37"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-lowlatency-tools-common"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-lowlatency-tools-host"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-modules-5.15.0-37-lowlatency"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-modules-5.15.0-37-lowlatency-64k"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-tools-5.15.0-37-lowlatency"
},
{
"binary_version": "5.15.0-37.39",
"binary_name": "linux-tools-5.15.0-37-lowlatency-64k"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-buildinfo-5.19.0-1030-lowlatency"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-buildinfo-5.19.0-1030-lowlatency-64k"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-cloud-tools-5.19.0-1030-lowlatency"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-headers-5.19.0-1030-lowlatency"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-headers-5.19.0-1030-lowlatency-64k"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-image-unsigned-5.19.0-1030-lowlatency"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-image-unsigned-5.19.0-1030-lowlatency-64k"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-lowlatency-hwe-5.19-cloud-tools-5.19.0-1030"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-lowlatency-hwe-5.19-cloud-tools-common"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-lowlatency-hwe-5.19-headers-5.19.0-1030"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-lowlatency-hwe-5.19-tools-5.19.0-1030"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-lowlatency-hwe-5.19-tools-common"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-lowlatency-hwe-5.19-tools-host"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-modules-5.19.0-1030-lowlatency"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-modules-5.19.0-1030-lowlatency-64k"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-modules-ipu6-5.19.0-1030-lowlatency"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-modules-ivsc-5.19.0-1030-lowlatency"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-modules-iwlwifi-5.19.0-1030-lowlatency"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-tools-5.19.0-1030-lowlatency"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-tools-5.19.0-1030-lowlatency-64k"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-buildinfo-6.2.0-1018-lowlatency"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-buildinfo-6.2.0-1018-lowlatency-64k"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-cloud-tools-6.2.0-1018-lowlatency"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-headers-6.2.0-1018-lowlatency"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-headers-6.2.0-1018-lowlatency-64k"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-image-unsigned-6.2.0-1018-lowlatency"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-image-unsigned-6.2.0-1018-lowlatency-64k"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.2-cloud-tools-6.2.0-1018"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.2-cloud-tools-common"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.2-headers-6.2.0-1018"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.2-tools-6.2.0-1018"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.2-tools-common"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.2-tools-host"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-modules-6.2.0-1018-lowlatency"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-modules-6.2.0-1018-lowlatency-64k"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-modules-ipu6-6.2.0-1018-lowlatency"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-modules-ivsc-6.2.0-1018-lowlatency"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-modules-iwlwifi-6.2.0-1018-lowlatency"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-tools-6.2.0-1018-lowlatency"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-tools-6.2.0-1018-lowlatency-64k"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-buildinfo-6.5.0-45-lowlatency"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-buildinfo-6.5.0-45-lowlatency-64k"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-cloud-tools-6.5.0-45-lowlatency"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-headers-6.5.0-45-lowlatency"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-headers-6.5.0-45-lowlatency-64k"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-image-unsigned-6.5.0-45-lowlatency"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-image-unsigned-6.5.0-45-lowlatency-64k"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.5-cloud-tools-6.5.0-45"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.5-cloud-tools-common"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.5-headers-6.5.0-45"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.5-lib-rust-6.5.0-45-lowlatency"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.5-tools-6.5.0-45"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.5-tools-common"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.5-tools-host"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-modules-6.5.0-45-lowlatency"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-modules-6.5.0-45-lowlatency-64k"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-modules-iwlwifi-6.5.0-45-lowlatency"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-tools-6.5.0-45-lowlatency"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-tools-6.5.0-45-lowlatency-64k"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-buildinfo-6.2.0-1015-nvidia"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-buildinfo-6.2.0-1015-nvidia-64k"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-headers-6.2.0-1015-nvidia"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-headers-6.2.0-1015-nvidia-64k"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-image-unsigned-6.2.0-1015-nvidia"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-image-unsigned-6.2.0-1015-nvidia-64k"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-modules-6.2.0-1015-nvidia"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-modules-6.2.0-1015-nvidia-64k"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-modules-extra-6.2.0-1015-nvidia"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-modules-nvidia-fs-6.2.0-1015-nvidia"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-modules-nvidia-fs-6.2.0-1015-nvidia-64k"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-nvidia-6.2-headers-6.2.0-1015"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-nvidia-6.2-tools-6.2.0-1015"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-nvidia-6.2-tools-host"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-tools-6.2.0-1015-nvidia"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-tools-6.2.0-1015-nvidia-64k"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "6.5.0-1024.25",
"binary_name": "linux-buildinfo-6.5.0-1024-nvidia"
},
{
"binary_version": "6.5.0-1024.25",
"binary_name": "linux-buildinfo-6.5.0-1024-nvidia-64k"
},
{
"binary_version": "6.5.0-1024.25",
"binary_name": "linux-headers-6.5.0-1024-nvidia"
},
{
"binary_version": "6.5.0-1024.25",
"binary_name": "linux-headers-6.5.0-1024-nvidia-64k"
},
{
"binary_version": "6.5.0-1024.25",
"binary_name": "linux-image-unsigned-6.5.0-1024-nvidia"
},
{
"binary_version": "6.5.0-1024.25",
"binary_name": "linux-image-unsigned-6.5.0-1024-nvidia-64k"
},
{
"binary_version": "6.5.0-1024.25",
"binary_name": "linux-modules-6.5.0-1024-nvidia"
},
{
"binary_version": "6.5.0-1024.25",
"binary_name": "linux-modules-6.5.0-1024-nvidia-64k"
},
{
"binary_version": "6.5.0-1024.25",
"binary_name": "linux-modules-extra-6.5.0-1024-nvidia"
},
{
"binary_version": "6.5.0-1024.25",
"binary_name": "linux-modules-nvidia-fs-6.5.0-1024-nvidia"
},
{
"binary_version": "6.5.0-1024.25",
"binary_name": "linux-modules-nvidia-fs-6.5.0-1024-nvidia-64k"
},
{
"binary_version": "6.5.0-1024.25",
"binary_name": "linux-nvidia-6.5-headers-6.5.0-1024"
},
{
"binary_version": "6.5.0-1024.25",
"binary_name": "linux-nvidia-6.5-tools-6.5.0-1024"
},
{
"binary_version": "6.5.0-1024.25",
"binary_name": "linux-nvidia-6.5-tools-host"
},
{
"binary_version": "6.5.0-1024.25",
"binary_name": "linux-tools-6.5.0-1024-nvidia"
},
{
"binary_version": "6.5.0-1024.25",
"binary_name": "linux-tools-6.5.0-1024-nvidia-64k"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.17.0-1035.36",
"binary_name": "linux-buildinfo-5.17.0-1035-oem"
},
{
"binary_version": "5.17.0-1035.36",
"binary_name": "linux-headers-5.17.0-1035-oem"
},
{
"binary_version": "5.17.0-1035.36",
"binary_name": "linux-image-unsigned-5.17.0-1035-oem"
},
{
"binary_version": "5.17.0-1035.36",
"binary_name": "linux-modules-5.17.0-1035-oem"
},
{
"binary_version": "5.17.0-1035.36",
"binary_name": "linux-modules-ipu6-5.17.0-1035-oem"
},
{
"binary_version": "5.17.0-1035.36",
"binary_name": "linux-modules-ivsc-5.17.0-1035-oem"
},
{
"binary_version": "5.17.0-1035.36",
"binary_name": "linux-modules-iwlwifi-5.17.0-1035-oem"
},
{
"binary_version": "5.17.0-1035.36",
"binary_name": "linux-oem-5.17-headers-5.17.0-1035"
},
{
"binary_version": "5.17.0-1035.36",
"binary_name": "linux-oem-5.17-tools-5.17.0-1035"
},
{
"binary_version": "5.17.0-1035.36",
"binary_name": "linux-oem-5.17-tools-host"
},
{
"binary_version": "5.17.0-1035.36",
"binary_name": "linux-tools-5.17.0-1035-oem"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "6.0.0-1021.21",
"binary_name": "linux-buildinfo-6.0.0-1021-oem"
},
{
"binary_version": "6.0.0-1021.21",
"binary_name": "linux-headers-6.0.0-1021-oem"
},
{
"binary_version": "6.0.0-1021.21",
"binary_name": "linux-image-unsigned-6.0.0-1021-oem"
},
{
"binary_version": "6.0.0-1021.21",
"binary_name": "linux-modules-6.0.0-1021-oem"
},
{
"binary_version": "6.0.0-1021.21",
"binary_name": "linux-modules-ipu6-6.0.0-1021-oem"
},
{
"binary_version": "6.0.0-1021.21",
"binary_name": "linux-modules-ivsc-6.0.0-1021-oem"
},
{
"binary_version": "6.0.0-1021.21",
"binary_name": "linux-modules-iwlwifi-6.0.0-1021-oem"
},
{
"binary_version": "6.0.0-1021.21",
"binary_name": "linux-oem-6.0-headers-6.0.0-1021"
},
{
"binary_version": "6.0.0-1021.21",
"binary_name": "linux-oem-6.0-tools-6.0.0-1021"
},
{
"binary_version": "6.0.0-1021.21",
"binary_name": "linux-oem-6.0-tools-host"
},
{
"binary_version": "6.0.0-1021.21",
"binary_name": "linux-tools-6.0.0-1021-oem"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "6.1.0-1036.36",
"binary_name": "linux-buildinfo-6.1.0-1036-oem"
},
{
"binary_version": "6.1.0-1036.36",
"binary_name": "linux-headers-6.1.0-1036-oem"
},
{
"binary_version": "6.1.0-1036.36",
"binary_name": "linux-image-unsigned-6.1.0-1036-oem"
},
{
"binary_version": "6.1.0-1036.36",
"binary_name": "linux-modules-6.1.0-1036-oem"
},
{
"binary_version": "6.1.0-1036.36",
"binary_name": "linux-modules-ipu6-6.1.0-1036-oem"
},
{
"binary_version": "6.1.0-1036.36",
"binary_name": "linux-modules-ivsc-6.1.0-1036-oem"
},
{
"binary_version": "6.1.0-1036.36",
"binary_name": "linux-modules-iwlwifi-6.1.0-1036-oem"
},
{
"binary_version": "6.1.0-1036.36",
"binary_name": "linux-oem-6.1-headers-6.1.0-1036"
},
{
"binary_version": "6.1.0-1036.36",
"binary_name": "linux-oem-6.1-tools-6.1.0-1036"
},
{
"binary_version": "6.1.0-1036.36",
"binary_name": "linux-oem-6.1-tools-host"
},
{
"binary_version": "6.1.0-1036.36",
"binary_name": "linux-tools-6.1.0-1036-oem"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "6.5.0-1027.28",
"binary_name": "linux-buildinfo-6.5.0-1027-oem"
},
{
"binary_version": "6.5.0-1027.28",
"binary_name": "linux-headers-6.5.0-1027-oem"
},
{
"binary_version": "6.5.0-1027.28",
"binary_name": "linux-image-unsigned-6.5.0-1027-oem"
},
{
"binary_version": "6.5.0-1027.28",
"binary_name": "linux-modules-6.5.0-1027-oem"
},
{
"binary_version": "6.5.0-1027.28",
"binary_name": "linux-modules-ipu6-6.5.0-1027-oem"
},
{
"binary_version": "6.5.0-1027.28",
"binary_name": "linux-modules-ivsc-6.5.0-1027-oem"
},
{
"binary_version": "6.5.0-1027.28",
"binary_name": "linux-modules-iwlwifi-6.5.0-1027-oem"
},
{
"binary_version": "6.5.0-1027.28",
"binary_name": "linux-modules-usbio-6.5.0-1027-oem"
},
{
"binary_version": "6.5.0-1027.28",
"binary_name": "linux-oem-6.5-headers-6.5.0-1027"
},
{
"binary_version": "6.5.0-1027.28",
"binary_name": "linux-oem-6.5-lib-rust-6.5.0-1027-oem"
},
{
"binary_version": "6.5.0-1027.28",
"binary_name": "linux-oem-6.5-tools-6.5.0-1027"
},
{
"binary_version": "6.5.0-1027.28",
"binary_name": "linux-oem-6.5-tools-host"
},
{
"binary_version": "6.5.0-1027.28",
"binary_name": "linux-tools-6.5.0-1027-oem"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.15.0-1009.12",
"binary_name": "linux-buildinfo-5.15.0-1009-oracle"
},
{
"binary_version": "5.15.0-1009.12",
"binary_name": "linux-headers-5.15.0-1009-oracle"
},
{
"binary_version": "5.15.0-1009.12",
"binary_name": "linux-image-unsigned-5.15.0-1009-oracle"
},
{
"binary_version": "5.15.0-1009.12",
"binary_name": "linux-modules-5.15.0-1009-oracle"
},
{
"binary_version": "5.15.0-1009.12",
"binary_name": "linux-modules-extra-5.15.0-1009-oracle"
},
{
"binary_version": "5.15.0-1009.12",
"binary_name": "linux-oracle-headers-5.15.0-1009"
},
{
"binary_version": "5.15.0-1009.12",
"binary_name": "linux-oracle-tools-5.15.0-1009"
},
{
"binary_version": "5.15.0-1009.12",
"binary_name": "linux-tools-5.15.0-1009-oracle"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-buildinfo-6.5.0-1027-oracle"
},
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-buildinfo-6.5.0-1027-oracle-64k"
},
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-headers-6.5.0-1027-oracle"
},
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-headers-6.5.0-1027-oracle-64k"
},
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-image-unsigned-6.5.0-1027-oracle"
},
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-image-unsigned-6.5.0-1027-oracle-64k"
},
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-modules-6.5.0-1027-oracle"
},
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-modules-6.5.0-1027-oracle-64k"
},
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-modules-extra-6.5.0-1027-oracle"
},
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-modules-extra-6.5.0-1027-oracle-64k"
},
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-oracle-6.5-headers-6.5.0-1027"
},
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-oracle-6.5-tools-6.5.0-1027"
},
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-tools-6.5.0-1027-oracle"
},
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-tools-6.5.0-1027-oracle-64k"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.15.0-1011.13",
"binary_name": "linux-buildinfo-5.15.0-1011-raspi"
},
{
"binary_version": "5.15.0-1011.13",
"binary_name": "linux-buildinfo-5.15.0-1011-raspi-nolpae"
},
{
"binary_version": "5.15.0-1011.13",
"binary_name": "linux-headers-5.15.0-1011-raspi"
},
{
"binary_version": "5.15.0-1011.13",
"binary_name": "linux-headers-5.15.0-1011-raspi-nolpae"
},
{
"binary_version": "5.15.0-1011.13",
"binary_name": "linux-image-5.15.0-1011-raspi"
},
{
"binary_version": "5.15.0-1011.13",
"binary_name": "linux-image-5.15.0-1011-raspi-nolpae"
},
{
"binary_version": "5.15.0-1011.13",
"binary_name": "linux-modules-5.15.0-1011-raspi"
},
{
"binary_version": "5.15.0-1011.13",
"binary_name": "linux-modules-5.15.0-1011-raspi-nolpae"
},
{
"binary_version": "5.15.0-1011.13",
"binary_name": "linux-modules-extra-5.15.0-1011-raspi"
},
{
"binary_version": "5.15.0-1011.13",
"binary_name": "linux-modules-extra-5.15.0-1011-raspi-nolpae"
},
{
"binary_version": "5.15.0-1011.13",
"binary_name": "linux-raspi-headers-5.15.0-1011"
},
{
"binary_version": "5.15.0-1011.13",
"binary_name": "linux-raspi-tools-5.15.0-1011"
},
{
"binary_version": "5.15.0-1011.13",
"binary_name": "linux-tools-5.15.0-1011-raspi"
},
{
"binary_version": "5.15.0-1011.13",
"binary_name": "linux-tools-5.15.0-1011-raspi-nolpae"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.15.0-1032.35",
"binary_name": "linux-buildinfo-5.15.0-1032-realtime"
},
{
"binary_version": "5.15.0-1032.35",
"binary_name": "linux-cloud-tools-5.15.0-1032-realtime"
},
{
"binary_version": "5.15.0-1032.35",
"binary_name": "linux-headers-5.15.0-1032-realtime"
},
{
"binary_version": "5.15.0-1032.35",
"binary_name": "linux-image-unsigned-5.15.0-1032-realtime"
},
{
"binary_version": "5.15.0-1032.35",
"binary_name": "linux-modules-5.15.0-1032-realtime"
},
{
"binary_version": "5.15.0-1032.35",
"binary_name": "linux-modules-extra-5.15.0-1032-realtime"
},
{
"binary_version": "5.15.0-1032.35",
"binary_name": "linux-realtime-cloud-tools-5.15.0-1032"
},
{
"binary_version": "5.15.0-1032.35",
"binary_name": "linux-realtime-cloud-tools-common"
},
{
"binary_version": "5.15.0-1032.35",
"binary_name": "linux-realtime-headers-5.15.0-1032"
},
{
"binary_version": "5.15.0-1032.35",
"binary_name": "linux-realtime-tools-5.15.0-1032"
},
{
"binary_version": "5.15.0-1032.35",
"binary_name": "linux-realtime-tools-common"
},
{
"binary_version": "5.15.0-1032.35",
"binary_name": "linux-realtime-tools-host"
},
{
"binary_version": "5.15.0-1032.35",
"binary_name": "linux-tools-5.15.0-1032-realtime"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.15.0-1028.32",
"binary_name": "linux-buildinfo-5.15.0-1028-generic"
},
{
"binary_version": "5.15.0-1028.32",
"binary_name": "linux-headers-5.15.0-1028-generic"
},
{
"binary_version": "5.15.0-1028.32",
"binary_name": "linux-image-5.15.0-1028-generic"
},
{
"binary_version": "5.15.0-1028.32",
"binary_name": "linux-modules-5.15.0-1028-generic"
},
{
"binary_version": "5.15.0-1028.32",
"binary_name": "linux-modules-extra-5.15.0-1028-generic"
},
{
"binary_version": "5.15.0-1028.32",
"binary_name": "linux-riscv-headers-5.15.0-1028"
},
{
"binary_version": "5.15.0-1028.32",
"binary_name": "linux-riscv-tools-5.15.0-1028"
},
{
"binary_version": "5.15.0-1028.32",
"binary_name": "linux-tools-5.15.0-1028-generic"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.19.0-1021.23~22.04.1",
"binary_name": "linux-buildinfo-5.19.0-1021-generic"
},
{
"binary_version": "5.19.0-1021.23~22.04.1",
"binary_name": "linux-headers-5.19.0-1021-generic"
},
{
"binary_version": "5.19.0-1021.23~22.04.1",
"binary_name": "linux-image-5.19.0-1021-generic"
},
{
"binary_version": "5.19.0-1021.23~22.04.1",
"binary_name": "linux-modules-5.19.0-1021-generic"
},
{
"binary_version": "5.19.0-1021.23~22.04.1",
"binary_name": "linux-modules-extra-5.19.0-1021-generic"
},
{
"binary_version": "5.19.0-1021.23~22.04.1",
"binary_name": "linux-riscv-5.19-headers-5.19.0-1021"
},
{
"binary_version": "5.19.0-1021.23~22.04.1",
"binary_name": "linux-riscv-5.19-tools-5.19.0-1021"
},
{
"binary_version": "5.19.0-1021.23~22.04.1",
"binary_name": "linux-tools-5.19.0-1021-generic"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-buildinfo-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-headers-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-image-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-modules-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-modules-extra-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-riscv-6.5-headers-6.5.0-45"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-riscv-6.5-tools-6.5.0-45"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-tools-6.5.0-45-generic"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.19.0-1020.22~22.04.1",
"binary_name": "linux-buildinfo-5.19.0-1020-starfive"
},
{
"binary_version": "5.19.0-1020.22~22.04.1",
"binary_name": "linux-headers-5.19.0-1020-starfive"
},
{
"binary_version": "5.19.0-1020.22~22.04.1",
"binary_name": "linux-image-5.19.0-1020-starfive"
},
{
"binary_version": "5.19.0-1020.22~22.04.1",
"binary_name": "linux-modules-5.19.0-1020-starfive"
},
{
"binary_version": "5.19.0-1020.22~22.04.1",
"binary_name": "linux-modules-extra-5.19.0-1020-starfive"
},
{
"binary_version": "5.19.0-1020.22~22.04.1",
"binary_name": "linux-starfive-5.19-headers-5.19.0-1020"
},
{
"binary_version": "5.19.0-1020.22~22.04.1",
"binary_name": "linux-starfive-5.19-tools-5.19.0-1020"
},
{
"binary_version": "5.19.0-1020.22~22.04.1",
"binary_name": "linux-tools-5.19.0-1020-starfive"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "6.2.0-1009.10~22.04.1",
"binary_name": "linux-buildinfo-6.2.0-1009-starfive"
},
{
"binary_version": "6.2.0-1009.10~22.04.1",
"binary_name": "linux-headers-6.2.0-1009-starfive"
},
{
"binary_version": "6.2.0-1009.10~22.04.1",
"binary_name": "linux-image-6.2.0-1009-starfive"
},
{
"binary_version": "6.2.0-1009.10~22.04.1",
"binary_name": "linux-modules-6.2.0-1009-starfive"
},
{
"binary_version": "6.2.0-1009.10~22.04.1",
"binary_name": "linux-modules-extra-6.2.0-1009-starfive"
},
{
"binary_version": "6.2.0-1009.10~22.04.1",
"binary_name": "linux-starfive-6.2-headers-6.2.0-1009"
},
{
"binary_version": "6.2.0-1009.10~22.04.1",
"binary_name": "linux-starfive-6.2-tools-6.2.0-1009"
},
{
"binary_version": "6.2.0-1009.10~22.04.1",
"binary_name": "linux-tools-6.2.0-1009-starfive"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "6.5.0-1018.19~22.04.1",
"binary_name": "linux-buildinfo-6.5.0-1018-starfive"
},
{
"binary_version": "6.5.0-1018.19~22.04.1",
"binary_name": "linux-headers-6.5.0-1018-starfive"
},
{
"binary_version": "6.5.0-1018.19~22.04.1",
"binary_name": "linux-image-6.5.0-1018-starfive"
},
{
"binary_version": "6.5.0-1018.19~22.04.1",
"binary_name": "linux-modules-6.5.0-1018-starfive"
},
{
"binary_version": "6.5.0-1018.19~22.04.1",
"binary_name": "linux-modules-extra-6.5.0-1018-starfive"
},
{
"binary_version": "6.5.0-1018.19~22.04.1",
"binary_name": "linux-starfive-6.5-headers-6.5.0-1018"
},
{
"binary_version": "6.5.0-1018.19~22.04.1",
"binary_name": "linux-starfive-6.5-tools-6.5.0-1018"
},
{
"binary_version": "6.5.0-1018.19~22.04.1",
"binary_name": "linux-tools-6.5.0-1018-starfive"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "6.8.0-2019.20",
"binary_name": "linux-buildinfo-6.8.0-2019-raspi-realtime"
},
{
"binary_version": "6.8.0-2019.20",
"binary_name": "linux-headers-6.8.0-2019-raspi-realtime"
},
{
"binary_version": "6.8.0-2019.20",
"binary_name": "linux-image-6.8.0-2019-raspi-realtime"
},
{
"binary_version": "6.8.0-2019.20",
"binary_name": "linux-modules-6.8.0-2019-raspi-realtime"
},
{
"binary_version": "6.8.0-2019.20",
"binary_name": "linux-raspi-realtime-headers-6.8.0-2019"
},
{
"binary_version": "6.8.0-2019.20",
"binary_name": "linux-raspi-realtime-tools-6.8.0-2019"
},
{
"binary_version": "6.8.0-2019.20",
"binary_name": "linux-tools-6.8.0-2019-raspi-realtime"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "4.15.0-1146.161~14.04.1",
"binary_name": "linux-azure-cloud-tools-4.15.0-1146"
},
{
"binary_version": "4.15.0-1146.161~14.04.1",
"binary_name": "linux-azure-headers-4.15.0-1146"
},
{
"binary_version": "4.15.0-1146.161~14.04.1",
"binary_name": "linux-azure-tools-4.15.0-1146"
},
{
"binary_version": "4.15.0-1146.161~14.04.1",
"binary_name": "linux-buildinfo-4.15.0-1146-azure"
},
{
"binary_version": "4.15.0-1146.161~14.04.1",
"binary_name": "linux-cloud-tools-4.15.0-1146-azure"
},
{
"binary_version": "4.15.0-1146.161~14.04.1",
"binary_name": "linux-headers-4.15.0-1146-azure"
},
{
"binary_version": "4.15.0-1146.161~14.04.1",
"binary_name": "linux-image-unsigned-4.15.0-1146-azure"
},
{
"binary_version": "4.15.0-1146.161~14.04.1",
"binary_name": "linux-modules-4.15.0-1146-azure"
},
{
"binary_version": "4.15.0-1146.161~14.04.1",
"binary_name": "linux-modules-extra-4.15.0-1146-azure"
},
{
"binary_version": "4.15.0-1146.161~14.04.1",
"binary_name": "linux-tools-4.15.0-1146-azure"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}{
"binaries": [
{
"binary_version": "3.13.0-208.259",
"binary_name": "block-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "crypto-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "fat-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "fb-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "firewire-core-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "floppy-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "fs-core-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "fs-secondary-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "input-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "ipmi-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "irda-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "kernel-image-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "linux-buildinfo-3.13.0-208-generic"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "linux-buildinfo-3.13.0-208-lowlatency"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "linux-cloud-tools-3.13.0-208"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "linux-cloud-tools-3.13.0-208-generic"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "linux-cloud-tools-3.13.0-208-lowlatency"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "linux-cloud-tools-common"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "linux-headers-3.13.0-208"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "linux-headers-3.13.0-208-generic"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "linux-headers-3.13.0-208-lowlatency"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "linux-image-unsigned-3.13.0-208-generic"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "linux-image-unsigned-3.13.0-208-lowlatency"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "linux-libc-dev"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "linux-modules-3.13.0-208-generic"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "linux-modules-3.13.0-208-lowlatency"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "linux-modules-extra-3.13.0-208-generic"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "linux-source-3.13.0"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "linux-tools-3.13.0-208"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "linux-tools-3.13.0-208-generic"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "linux-tools-3.13.0-208-lowlatency"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "linux-tools-common"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "linux-udebs-generic"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "md-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "message-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "mouse-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "multipath-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "nfs-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "nic-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "nic-pcmcia-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "nic-shared-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "nic-usb-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "parport-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "pata-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "pcmcia-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "pcmcia-storage-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "plip-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "ppp-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "sata-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "scsi-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "serial-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "speakup-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "squashfs-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "storage-core-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "usb-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "virtio-modules-3.13.0-208-generic-di"
},
{
"binary_version": "3.13.0-208.259",
"binary_name": "vlan-modules-3.13.0-208-generic-di"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "4.4.0-1149.155",
"binary_name": "linux-aws-cloud-tools-4.4.0-1149"
},
{
"binary_version": "4.4.0-1149.155",
"binary_name": "linux-aws-headers-4.4.0-1149"
},
{
"binary_version": "4.4.0-1149.155",
"binary_name": "linux-aws-tools-4.4.0-1149"
},
{
"binary_version": "4.4.0-1149.155",
"binary_name": "linux-buildinfo-4.4.0-1149-aws"
},
{
"binary_version": "4.4.0-1149.155",
"binary_name": "linux-cloud-tools-4.4.0-1149-aws"
},
{
"binary_version": "4.4.0-1149.155",
"binary_name": "linux-headers-4.4.0-1149-aws"
},
{
"binary_version": "4.4.0-1149.155",
"binary_name": "linux-image-4.4.0-1149-aws"
},
{
"binary_version": "4.4.0-1149.155",
"binary_name": "linux-modules-4.4.0-1149-aws"
},
{
"binary_version": "4.4.0-1149.155",
"binary_name": "linux-tools-4.4.0-1149-aws"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "block-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "crypto-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "fat-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "fb-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "firewire-core-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "floppy-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "fs-core-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "fs-secondary-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "input-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "ipmi-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "irda-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "kernel-image-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "linux-buildinfo-4.4.0-274-generic"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "linux-buildinfo-4.4.0-274-lowlatency"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "linux-cloud-tools-4.4.0-274-generic"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "linux-cloud-tools-4.4.0-274-lowlatency"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "linux-headers-4.4.0-274"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "linux-headers-4.4.0-274-generic"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "linux-headers-4.4.0-274-lowlatency"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "linux-image-4.4.0-274-generic"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "linux-image-unsigned-4.4.0-274-generic"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "linux-image-unsigned-4.4.0-274-lowlatency"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "linux-lts-xenial-cloud-tools-4.4.0-274"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "linux-lts-xenial-tools-4.4.0-274"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "linux-lts-xenial-udebs-generic"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "linux-modules-4.4.0-274-generic"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "linux-modules-4.4.0-274-lowlatency"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "linux-modules-extra-4.4.0-274-generic"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "linux-tools-4.4.0-274-generic"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "linux-tools-4.4.0-274-lowlatency"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "md-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "message-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "mouse-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "multipath-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "nfs-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "nic-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "nic-pcmcia-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "nic-shared-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "nic-usb-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "parport-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "pata-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "pcmcia-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "pcmcia-storage-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "plip-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "ppp-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "sata-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "scsi-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "serial-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "speakup-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "storage-core-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "usb-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "virtio-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308~14.04.1",
"binary_name": "vlan-modules-4.4.0-274-generic-di"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "4.4.0-274.308",
"binary_name": "block-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "crypto-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "dasd-extra-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "dasd-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "fat-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "fb-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "firewire-core-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "floppy-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "fs-core-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "fs-secondary-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "input-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "ipmi-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "irda-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "kernel-image-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "linux-buildinfo-4.4.0-274-generic"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "linux-buildinfo-4.4.0-274-lowlatency"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "linux-cloud-tools-4.4.0-274"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "linux-cloud-tools-4.4.0-274-generic"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "linux-cloud-tools-4.4.0-274-lowlatency"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "linux-cloud-tools-common"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "linux-headers-4.4.0-274"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "linux-headers-4.4.0-274-generic"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "linux-headers-4.4.0-274-lowlatency"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "linux-image-4.4.0-274-generic"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "linux-image-unsigned-4.4.0-274-generic"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "linux-image-unsigned-4.4.0-274-lowlatency"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "linux-libc-dev"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "linux-modules-4.4.0-274-generic"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "linux-modules-4.4.0-274-lowlatency"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "linux-modules-extra-4.4.0-274-generic"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "linux-source-4.4.0"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "linux-tools-4.4.0-274"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "linux-tools-4.4.0-274-generic"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "linux-tools-4.4.0-274-lowlatency"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "linux-tools-common"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "linux-tools-host"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "linux-udebs-generic"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "md-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "message-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "mouse-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "multipath-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "nfs-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "nic-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "nic-pcmcia-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "nic-shared-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "nic-usb-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "parport-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "pata-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "pcmcia-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "pcmcia-storage-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "plip-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "ppp-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "sata-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "scsi-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "serial-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "speakup-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "storage-core-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "usb-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "virtio-modules-4.4.0-274-generic-di"
},
{
"binary_version": "4.4.0-274.308",
"binary_name": "vlan-modules-4.4.0-274-generic-di"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "4.4.0-1187.202",
"binary_name": "linux-aws-cloud-tools-4.4.0-1187"
},
{
"binary_version": "4.4.0-1187.202",
"binary_name": "linux-aws-headers-4.4.0-1187"
},
{
"binary_version": "4.4.0-1187.202",
"binary_name": "linux-aws-tools-4.4.0-1187"
},
{
"binary_version": "4.4.0-1187.202",
"binary_name": "linux-buildinfo-4.4.0-1187-aws"
},
{
"binary_version": "4.4.0-1187.202",
"binary_name": "linux-cloud-tools-4.4.0-1187-aws"
},
{
"binary_version": "4.4.0-1187.202",
"binary_name": "linux-headers-4.4.0-1187-aws"
},
{
"binary_version": "4.4.0-1187.202",
"binary_name": "linux-image-4.4.0-1187-aws"
},
{
"binary_version": "4.4.0-1187.202",
"binary_name": "linux-modules-4.4.0-1187-aws"
},
{
"binary_version": "4.4.0-1187.202",
"binary_name": "linux-modules-extra-4.4.0-1187-aws"
},
{
"binary_version": "4.4.0-1187.202",
"binary_name": "linux-tools-4.4.0-1187-aws"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "4.15.0-1137.148~16.04.1",
"binary_name": "linux-aws-headers-4.15.0-1137"
},
{
"binary_version": "4.15.0-1137.148~16.04.1",
"binary_name": "linux-aws-hwe-cloud-tools-4.15.0-1137"
},
{
"binary_version": "4.15.0-1137.148~16.04.1",
"binary_name": "linux-aws-hwe-tools-4.15.0-1137"
},
{
"binary_version": "4.15.0-1137.148~16.04.1",
"binary_name": "linux-buildinfo-4.15.0-1137-aws"
},
{
"binary_version": "4.15.0-1137.148~16.04.1",
"binary_name": "linux-cloud-tools-4.15.0-1137-aws"
},
{
"binary_version": "4.15.0-1137.148~16.04.1",
"binary_name": "linux-headers-4.15.0-1137-aws"
},
{
"binary_version": "4.15.0-1137.148~16.04.1",
"binary_name": "linux-image-unsigned-4.15.0-1137-aws"
},
{
"binary_version": "4.15.0-1137.148~16.04.1",
"binary_name": "linux-modules-4.15.0-1137-aws"
},
{
"binary_version": "4.15.0-1137.148~16.04.1",
"binary_name": "linux-modules-extra-4.15.0-1137-aws"
},
{
"binary_version": "4.15.0-1137.148~16.04.1",
"binary_name": "linux-tools-4.15.0-1137-aws"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}{
"binaries": [
{
"binary_version": "4.15.0-1146.161~16.04.1",
"binary_name": "linux-azure-cloud-tools-4.15.0-1146"
},
{
"binary_version": "4.15.0-1146.161~16.04.1",
"binary_name": "linux-azure-headers-4.15.0-1146"
},
{
"binary_version": "4.15.0-1146.161~16.04.1",
"binary_name": "linux-azure-tools-4.15.0-1146"
},
{
"binary_version": "4.15.0-1146.161~16.04.1",
"binary_name": "linux-buildinfo-4.15.0-1146-azure"
},
{
"binary_version": "4.15.0-1146.161~16.04.1",
"binary_name": "linux-cloud-tools-4.15.0-1146-azure"
},
{
"binary_version": "4.15.0-1146.161~16.04.1",
"binary_name": "linux-headers-4.15.0-1146-azure"
},
{
"binary_version": "4.15.0-1146.161~16.04.1",
"binary_name": "linux-image-unsigned-4.15.0-1146-azure"
},
{
"binary_version": "4.15.0-1146.161~16.04.1",
"binary_name": "linux-modules-4.15.0-1146-azure"
},
{
"binary_version": "4.15.0-1146.161~16.04.1",
"binary_name": "linux-modules-extra-4.15.0-1146-azure"
},
{
"binary_version": "4.15.0-1146.161~16.04.1",
"binary_name": "linux-tools-4.15.0-1146-azure"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}{
"binaries": [
{
"binary_version": "4.15.0-1131.147~16.04.1",
"binary_name": "linux-buildinfo-4.15.0-1131-gcp"
},
{
"binary_version": "4.15.0-1131.147~16.04.1",
"binary_name": "linux-gcp-headers-4.15.0-1131"
},
{
"binary_version": "4.15.0-1131.147~16.04.1",
"binary_name": "linux-gcp-tools-4.15.0-1131"
},
{
"binary_version": "4.15.0-1131.147~16.04.1",
"binary_name": "linux-headers-4.15.0-1131-gcp"
},
{
"binary_version": "4.15.0-1131.147~16.04.1",
"binary_name": "linux-image-unsigned-4.15.0-1131-gcp"
},
{
"binary_version": "4.15.0-1131.147~16.04.1",
"binary_name": "linux-modules-4.15.0-1131-gcp"
},
{
"binary_version": "4.15.0-1131.147~16.04.1",
"binary_name": "linux-modules-extra-4.15.0-1131-gcp"
},
{
"binary_version": "4.15.0-1131.147~16.04.1",
"binary_name": "linux-tools-4.15.0-1131-gcp"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}{
"binaries": [
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "block-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "crypto-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "dasd-extra-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "dasd-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "fat-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "fb-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "firewire-core-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "floppy-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "fs-core-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "fs-secondary-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "input-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "ipmi-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "irda-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "kernel-image-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "linux-buildinfo-4.15.0-189-generic"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "linux-buildinfo-4.15.0-189-lowlatency"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "linux-cloud-tools-4.15.0-189-generic"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "linux-cloud-tools-4.15.0-189-lowlatency"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "linux-headers-4.15.0-189"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "linux-headers-4.15.0-189-generic"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "linux-headers-4.15.0-189-lowlatency"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "linux-hwe-cloud-tools-4.15.0-189"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "linux-hwe-tools-4.15.0-189"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "linux-hwe-udebs-generic"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "linux-image-4.15.0-189-generic"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "linux-image-unsigned-4.15.0-189-generic"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "linux-image-unsigned-4.15.0-189-lowlatency"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "linux-modules-4.15.0-189-generic"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "linux-modules-4.15.0-189-lowlatency"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "linux-modules-extra-4.15.0-189-generic"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "linux-source-4.15.0"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "linux-tools-4.15.0-189-generic"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "linux-tools-4.15.0-189-lowlatency"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "md-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "message-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "mouse-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "multipath-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "nfs-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "nic-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "nic-pcmcia-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "nic-shared-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "nic-usb-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "parport-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "pata-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "pcmcia-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "pcmcia-storage-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "plip-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "ppp-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "sata-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "scsi-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "serial-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "storage-core-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "usb-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "virtio-modules-4.15.0-189-generic-di"
},
{
"binary_version": "4.15.0-189.200~16.04.1",
"binary_name": "vlan-modules-4.15.0-189-generic-di"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}{
"binaries": [
{
"binary_version": "4.4.0-1150.161",
"binary_name": "linux-buildinfo-4.4.0-1150-kvm"
},
{
"binary_version": "4.4.0-1150.161",
"binary_name": "linux-cloud-tools-4.4.0-1150-kvm"
},
{
"binary_version": "4.4.0-1150.161",
"binary_name": "linux-headers-4.4.0-1150-kvm"
},
{
"binary_version": "4.4.0-1150.161",
"binary_name": "linux-image-4.4.0-1150-kvm"
},
{
"binary_version": "4.4.0-1150.161",
"binary_name": "linux-kvm-cloud-tools-4.4.0-1150"
},
{
"binary_version": "4.4.0-1150.161",
"binary_name": "linux-kvm-headers-4.4.0-1150"
},
{
"binary_version": "4.4.0-1150.161",
"binary_name": "linux-kvm-tools-4.4.0-1150"
},
{
"binary_version": "4.4.0-1150.161",
"binary_name": "linux-modules-4.4.0-1150-kvm"
},
{
"binary_version": "4.4.0-1150.161",
"binary_name": "linux-tools-4.4.0-1150-kvm"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "4.15.0-1102.113~16.04.1",
"binary_name": "linux-buildinfo-4.15.0-1102-oracle"
},
{
"binary_version": "4.15.0-1102.113~16.04.1",
"binary_name": "linux-headers-4.15.0-1102-oracle"
},
{
"binary_version": "4.15.0-1102.113~16.04.1",
"binary_name": "linux-image-unsigned-4.15.0-1102-oracle"
},
{
"binary_version": "4.15.0-1102.113~16.04.1",
"binary_name": "linux-modules-4.15.0-1102-oracle"
},
{
"binary_version": "4.15.0-1102.113~16.04.1",
"binary_name": "linux-modules-extra-4.15.0-1102-oracle"
},
{
"binary_version": "4.15.0-1102.113~16.04.1",
"binary_name": "linux-oracle-headers-4.15.0-1102"
},
{
"binary_version": "4.15.0-1102.113~16.04.1",
"binary_name": "linux-oracle-tools-4.15.0-1102"
},
{
"binary_version": "4.15.0-1102.113~16.04.1",
"binary_name": "linux-tools-4.15.0-1102-oracle"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}{
"binaries": [
{
"binary_version": "5.15.0-1014.14",
"binary_name": "linux-buildinfo-5.15.0-1014-realtime"
},
{
"binary_version": "5.15.0-1014.14",
"binary_name": "linux-cloud-tools-5.15.0-1014-realtime"
},
{
"binary_version": "5.15.0-1014.14",
"binary_name": "linux-headers-5.15.0-1014-realtime"
},
{
"binary_version": "5.15.0-1014.14",
"binary_name": "linux-image-unsigned-5.15.0-1014-realtime"
},
{
"binary_version": "5.15.0-1014.14",
"binary_name": "linux-modules-5.15.0-1014-realtime"
},
{
"binary_version": "5.15.0-1014.14",
"binary_name": "linux-modules-extra-5.15.0-1014-realtime"
},
{
"binary_version": "5.15.0-1014.14",
"binary_name": "linux-realtime-cloud-tools-5.15.0-1014"
},
{
"binary_version": "5.15.0-1014.14",
"binary_name": "linux-realtime-cloud-tools-common"
},
{
"binary_version": "5.15.0-1014.14",
"binary_name": "linux-realtime-headers-5.15.0-1014"
},
{
"binary_version": "5.15.0-1014.14",
"binary_name": "linux-realtime-tools-5.15.0-1014"
},
{
"binary_version": "5.15.0-1014.14",
"binary_name": "linux-realtime-tools-common"
},
{
"binary_version": "5.15.0-1014.14",
"binary_name": "linux-realtime-tools-host"
},
{
"binary_version": "5.15.0-1014.14",
"binary_name": "linux-tools-5.15.0-1014-realtime"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}{
"binaries": [
{
"binary_version": "4.15.0-2076.81",
"binary_name": "linux-aws-fips-headers-4.15.0-2076"
},
{
"binary_version": "4.15.0-2076.81",
"binary_name": "linux-aws-fips-tools-4.15.0-2076"
},
{
"binary_version": "4.15.0-2076.81",
"binary_name": "linux-buildinfo-4.15.0-2076-aws-fips"
},
{
"binary_version": "4.15.0-2076.81",
"binary_name": "linux-headers-4.15.0-2076-aws-fips"
},
{
"binary_version": "4.15.0-2076.81",
"binary_name": "linux-image-unsigned-4.15.0-2076-aws-fips"
},
{
"binary_version": "4.15.0-2076.81",
"binary_name": "linux-image-unsigned-hmac-4.15.0-2076-aws-fips"
},
{
"binary_version": "4.15.0-2076.81",
"binary_name": "linux-modules-4.15.0-2076-aws-fips"
},
{
"binary_version": "4.15.0-2076.81",
"binary_name": "linux-modules-extra-4.15.0-2076-aws-fips"
},
{
"binary_version": "4.15.0-2076.81",
"binary_name": "linux-tools-4.15.0-2076-aws-fips"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}{
"binaries": [
{
"binary_version": "4.15.0-2057.63",
"binary_name": "linux-azure-fips-cloud-tools-4.15.0-2057"
},
{
"binary_version": "4.15.0-2057.63",
"binary_name": "linux-azure-fips-headers-4.15.0-2057"
},
{
"binary_version": "4.15.0-2057.63",
"binary_name": "linux-azure-fips-tools-4.15.0-2057"
},
{
"binary_version": "4.15.0-2057.63",
"binary_name": "linux-buildinfo-4.15.0-2057-azure-fips"
},
{
"binary_version": "4.15.0-2057.63",
"binary_name": "linux-cloud-tools-4.15.0-2057-azure-fips"
},
{
"binary_version": "4.15.0-2057.63",
"binary_name": "linux-headers-4.15.0-2057-azure-fips"
},
{
"binary_version": "4.15.0-2057.63",
"binary_name": "linux-image-unsigned-4.15.0-2057-azure-fips"
},
{
"binary_version": "4.15.0-2057.63",
"binary_name": "linux-image-unsigned-hmac-4.15.0-2057-azure-fips"
},
{
"binary_version": "4.15.0-2057.63",
"binary_name": "linux-modules-4.15.0-2057-azure-fips"
},
{
"binary_version": "4.15.0-2057.63",
"binary_name": "linux-modules-extra-4.15.0-2057-azure-fips"
},
{
"binary_version": "4.15.0-2057.63",
"binary_name": "linux-tools-4.15.0-2057-azure-fips"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}{
"binaries": [
{
"binary_version": "4.15.0-1094.105",
"binary_name": "linux-buildinfo-4.15.0-1094-fips"
},
{
"binary_version": "4.15.0-1094.105",
"binary_name": "linux-fips-headers-4.15.0-1094"
},
{
"binary_version": "4.15.0-1094.105",
"binary_name": "linux-fips-tools-4.15.0-1094"
},
{
"binary_version": "4.15.0-1094.105",
"binary_name": "linux-fips-tools-host"
},
{
"binary_version": "4.15.0-1094.105",
"binary_name": "linux-headers-4.15.0-1094-fips"
},
{
"binary_version": "4.15.0-1094.105",
"binary_name": "linux-image-4.15.0-1094-fips"
},
{
"binary_version": "4.15.0-1094.105",
"binary_name": "linux-image-hmac-4.15.0-1094-fips"
},
{
"binary_version": "4.15.0-1094.105",
"binary_name": "linux-image-unsigned-4.15.0-1094-fips"
},
{
"binary_version": "4.15.0-1094.105",
"binary_name": "linux-image-unsigned-hmac-4.15.0-1094-fips"
},
{
"binary_version": "4.15.0-1094.105",
"binary_name": "linux-modules-4.15.0-1094-fips"
},
{
"binary_version": "4.15.0-1094.105",
"binary_name": "linux-modules-extra-4.15.0-1094-fips"
},
{
"binary_version": "4.15.0-1094.105",
"binary_name": "linux-tools-4.15.0-1094-fips"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}{
"binaries": [
{
"binary_version": "4.15.0-2041.46",
"binary_name": "linux-buildinfo-4.15.0-2041-gcp-fips"
},
{
"binary_version": "4.15.0-2041.46",
"binary_name": "linux-gcp-fips-headers-4.15.0-2041"
},
{
"binary_version": "4.15.0-2041.46",
"binary_name": "linux-gcp-fips-tools-4.15.0-2041"
},
{
"binary_version": "4.15.0-2041.46",
"binary_name": "linux-headers-4.15.0-2041-gcp-fips"
},
{
"binary_version": "4.15.0-2041.46",
"binary_name": "linux-image-unsigned-4.15.0-2041-gcp-fips"
},
{
"binary_version": "4.15.0-2041.46",
"binary_name": "linux-image-unsigned-hmac-4.15.0-2041-gcp-fips"
},
{
"binary_version": "4.15.0-2041.46",
"binary_name": "linux-modules-4.15.0-2041-gcp-fips"
},
{
"binary_version": "4.15.0-2041.46",
"binary_name": "linux-modules-extra-4.15.0-2041-gcp-fips"
},
{
"binary_version": "4.15.0-2041.46",
"binary_name": "linux-tools-4.15.0-2041-gcp-fips"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}{
"binaries": [
{
"binary_version": "5.4.0-1081.88+fips1",
"binary_name": "linux-aws-fips-headers-5.4.0-1081"
},
{
"binary_version": "5.4.0-1081.88+fips1",
"binary_name": "linux-aws-fips-tools-5.4.0-1081"
},
{
"binary_version": "5.4.0-1081.88+fips1",
"binary_name": "linux-buildinfo-5.4.0-1081-aws-fips"
},
{
"binary_version": "5.4.0-1081.88+fips1",
"binary_name": "linux-headers-5.4.0-1081-aws-fips"
},
{
"binary_version": "5.4.0-1081.88+fips1",
"binary_name": "linux-image-unsigned-5.4.0-1081-aws-fips"
},
{
"binary_version": "5.4.0-1081.88+fips1",
"binary_name": "linux-image-unsigned-hmac-5.4.0-1081-aws-fips"
},
{
"binary_version": "5.4.0-1081.88+fips1",
"binary_name": "linux-modules-5.4.0-1081-aws-fips"
},
{
"binary_version": "5.4.0-1081.88+fips1",
"binary_name": "linux-modules-extra-5.4.0-1081-aws-fips"
},
{
"binary_version": "5.4.0-1081.88+fips1",
"binary_name": "linux-tools-5.4.0-1081-aws-fips"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}{
"binaries": [
{
"binary_version": "5.4.0-1086.91+fips1",
"binary_name": "linux-azure-fips-cloud-tools-5.4.0-1086"
},
{
"binary_version": "5.4.0-1086.91+fips1",
"binary_name": "linux-azure-fips-headers-5.4.0-1086"
},
{
"binary_version": "5.4.0-1086.91+fips1",
"binary_name": "linux-azure-fips-tools-5.4.0-1086"
},
{
"binary_version": "5.4.0-1086.91+fips1",
"binary_name": "linux-buildinfo-5.4.0-1086-azure-fips"
},
{
"binary_version": "5.4.0-1086.91+fips1",
"binary_name": "linux-cloud-tools-5.4.0-1086-azure-fips"
},
{
"binary_version": "5.4.0-1086.91+fips1",
"binary_name": "linux-headers-5.4.0-1086-azure-fips"
},
{
"binary_version": "5.4.0-1086.91+fips1",
"binary_name": "linux-image-unsigned-5.4.0-1086-azure-fips"
},
{
"binary_version": "5.4.0-1086.91+fips1",
"binary_name": "linux-image-unsigned-hmac-5.4.0-1086-azure-fips"
},
{
"binary_version": "5.4.0-1086.91+fips1",
"binary_name": "linux-modules-5.4.0-1086-azure-fips"
},
{
"binary_version": "5.4.0-1086.91+fips1",
"binary_name": "linux-modules-extra-5.4.0-1086-azure-fips"
},
{
"binary_version": "5.4.0-1086.91+fips1",
"binary_name": "linux-tools-5.4.0-1086-azure-fips"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}{
"binaries": [
{
"binary_version": "5.4.0-1057.65",
"binary_name": "linux-buildinfo-5.4.0-1057-fips"
},
{
"binary_version": "5.4.0-1057.65",
"binary_name": "linux-fips-headers-5.4.0-1057"
},
{
"binary_version": "5.4.0-1057.65",
"binary_name": "linux-fips-tools-5.4.0-1057"
},
{
"binary_version": "5.4.0-1057.65",
"binary_name": "linux-fips-tools-host"
},
{
"binary_version": "5.4.0-1057.65",
"binary_name": "linux-headers-5.4.0-1057-fips"
},
{
"binary_version": "5.4.0-1057.65",
"binary_name": "linux-image-unsigned-5.4.0-1057-fips"
},
{
"binary_version": "5.4.0-1057.65",
"binary_name": "linux-image-unsigned-hmac-5.4.0-1057-fips"
},
{
"binary_version": "5.4.0-1057.65",
"binary_name": "linux-modules-5.4.0-1057-fips"
},
{
"binary_version": "5.4.0-1057.65",
"binary_name": "linux-modules-extra-5.4.0-1057-fips"
},
{
"binary_version": "5.4.0-1057.65",
"binary_name": "linux-tools-5.4.0-1057-fips"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}{
"binaries": [
{
"binary_version": "5.4.0-1081.88+fips1",
"binary_name": "linux-buildinfo-5.4.0-1081-gcp-fips"
},
{
"binary_version": "5.4.0-1081.88+fips1",
"binary_name": "linux-gcp-fips-headers-5.4.0-1081"
},
{
"binary_version": "5.4.0-1081.88+fips1",
"binary_name": "linux-gcp-fips-tools-5.4.0-1081"
},
{
"binary_version": "5.4.0-1081.88+fips1",
"binary_name": "linux-headers-5.4.0-1081-gcp-fips"
},
{
"binary_version": "5.4.0-1081.88+fips1",
"binary_name": "linux-image-unsigned-5.4.0-1081-gcp-fips"
},
{
"binary_version": "5.4.0-1081.88+fips1",
"binary_name": "linux-image-unsigned-hmac-5.4.0-1081-gcp-fips"
},
{
"binary_version": "5.4.0-1081.88+fips1",
"binary_name": "linux-modules-5.4.0-1081-gcp-fips"
},
{
"binary_version": "5.4.0-1081.88+fips1",
"binary_name": "linux-modules-extra-5.4.0-1081-gcp-fips"
},
{
"binary_version": "5.4.0-1081.88+fips1",
"binary_name": "linux-tools-5.4.0-1081-gcp-fips"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}{
"binaries": [
{
"binary_version": "4.4.0-1119.126",
"binary_name": "block-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "crypto-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "dasd-extra-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "dasd-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "fat-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "fb-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "firewire-core-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "floppy-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "fs-core-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "fs-secondary-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "input-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "ipmi-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "irda-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "kernel-image-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "linux-buildinfo-4.4.0-1119-fips"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "linux-fips-cloud-tools-common"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "linux-fips-headers-4.4.0-1119"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "linux-fips-source-4.4.0"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "linux-fips-tools-4.4.0-1119"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "linux-headers-4.4.0-1119-fips"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "linux-image-4.4.0-1119-fips"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "linux-image-hmac-4.4.0-1119-fips"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "linux-image-unsigned-4.4.0-1119-fips"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "linux-image-unsigned-hmac-4.4.0-1119-fips"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "linux-modules-4.4.0-1119-fips"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "linux-modules-extra-4.4.0-1119-fips"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "linux-tools-4.4.0-1119-fips"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "linux-udebs-fips"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "md-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "message-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "mouse-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "multipath-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "nfs-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "nic-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "nic-pcmcia-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "nic-shared-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "nic-usb-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "parport-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "pata-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "pcmcia-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "pcmcia-storage-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "plip-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "ppp-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "sata-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "scsi-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "serial-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "speakup-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "storage-core-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "usb-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "virtio-modules-4.4.0-1119-fips-di"
},
{
"binary_version": "4.4.0-1119.126",
"binary_name": "vlan-modules-4.4.0-1119-fips-di"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "4.4.0-1002.2",
"binary_name": "block-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "crypto-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "dasd-extra-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "dasd-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "fat-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "fb-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "firewire-core-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "floppy-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "fs-core-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "fs-secondary-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "input-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "ipmi-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "irda-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "kernel-image-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "linux-fips-headers-4.4.0-1002"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "linux-fips-source-4.4.0"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "linux-fips-tools-4.4.0-1002"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "linux-headers-4.4.0-1002-fips"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "linux-image-4.4.0-1002-fips"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "linux-image-extra-4.4.0-1002-fips"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "linux-image-hmac-4.4.0-1002-fips"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "linux-tools-4.4.0-1002-fips"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "linux-udebs-fips"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "md-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "message-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "mouse-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "multipath-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "nfs-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "nic-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "nic-pcmcia-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "nic-shared-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "nic-usb-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "parport-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "pata-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "pcmcia-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "pcmcia-storage-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "plip-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "ppp-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "sata-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "scsi-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "serial-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "speakup-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "storage-core-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "usb-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "virtio-modules-4.4.0-1002-fips-di"
},
{
"binary_version": "4.4.0-1002.2",
"binary_name": "vlan-modules-4.4.0-1002-fips-di"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "4.15.0-2000.4",
"binary_name": "linux-aws-fips-headers-4.15.0-2000"
},
{
"binary_version": "4.15.0-2000.4",
"binary_name": "linux-aws-fips-tools-4.15.0-2000"
},
{
"binary_version": "4.15.0-2000.4",
"binary_name": "linux-buildinfo-4.15.0-2000-aws-fips"
},
{
"binary_version": "4.15.0-2000.4",
"binary_name": "linux-headers-4.15.0-2000-aws-fips"
},
{
"binary_version": "4.15.0-2000.4",
"binary_name": "linux-image-unsigned-4.15.0-2000-aws-fips"
},
{
"binary_version": "4.15.0-2000.4",
"binary_name": "linux-image-unsigned-hmac-4.15.0-2000-aws-fips"
},
{
"binary_version": "4.15.0-2000.4",
"binary_name": "linux-modules-4.15.0-2000-aws-fips"
},
{
"binary_version": "4.15.0-2000.4",
"binary_name": "linux-modules-extra-4.15.0-2000-aws-fips"
},
{
"binary_version": "4.15.0-2000.4",
"binary_name": "linux-tools-4.15.0-2000-aws-fips"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "4.15.0-1002.2",
"binary_name": "linux-azure-fips-cloud-tools-4.15.0-1002"
},
{
"binary_version": "4.15.0-1002.2",
"binary_name": "linux-azure-fips-headers-4.15.0-1002"
},
{
"binary_version": "4.15.0-1002.2",
"binary_name": "linux-azure-fips-tools-4.15.0-1002"
},
{
"binary_version": "4.15.0-1002.2",
"binary_name": "linux-buildinfo-4.15.0-1002-azure-fips"
},
{
"binary_version": "4.15.0-1002.2",
"binary_name": "linux-cloud-tools-4.15.0-1002-azure-fips"
},
{
"binary_version": "4.15.0-1002.2",
"binary_name": "linux-headers-4.15.0-1002-azure-fips"
},
{
"binary_version": "4.15.0-1002.2",
"binary_name": "linux-image-unsigned-4.15.0-1002-azure-fips"
},
{
"binary_version": "4.15.0-1002.2",
"binary_name": "linux-image-unsigned-hmac-4.15.0-1002-azure-fips"
},
{
"binary_version": "4.15.0-1002.2",
"binary_name": "linux-modules-4.15.0-1002-azure-fips"
},
{
"binary_version": "4.15.0-1002.2",
"binary_name": "linux-modules-extra-4.15.0-1002-azure-fips"
},
{
"binary_version": "4.15.0-1002.2",
"binary_name": "linux-tools-4.15.0-1002-azure-fips"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "4.15.0-1011.12",
"binary_name": "linux-buildinfo-4.15.0-1011-fips"
},
{
"binary_version": "4.15.0-1011.12",
"binary_name": "linux-fips-headers-4.15.0-1011"
},
{
"binary_version": "4.15.0-1011.12",
"binary_name": "linux-fips-tools-4.15.0-1011"
},
{
"binary_version": "4.15.0-1011.12",
"binary_name": "linux-fips-tools-host"
},
{
"binary_version": "4.15.0-1011.12",
"binary_name": "linux-headers-4.15.0-1011-fips"
},
{
"binary_version": "4.15.0-1011.12",
"binary_name": "linux-image-4.15.0-1011-fips"
},
{
"binary_version": "4.15.0-1011.12",
"binary_name": "linux-image-hmac-4.15.0-1011-fips"
},
{
"binary_version": "4.15.0-1011.12",
"binary_name": "linux-image-unsigned-4.15.0-1011-fips"
},
{
"binary_version": "4.15.0-1011.12",
"binary_name": "linux-image-unsigned-hmac-4.15.0-1011-fips"
},
{
"binary_version": "4.15.0-1011.12",
"binary_name": "linux-modules-4.15.0-1011-fips"
},
{
"binary_version": "4.15.0-1011.12",
"binary_name": "linux-modules-extra-4.15.0-1011-fips"
},
{
"binary_version": "4.15.0-1011.12",
"binary_name": "linux-tools-4.15.0-1011-fips"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "4.15.0-1001.1",
"binary_name": "linux-buildinfo-4.15.0-1001-gcp-fips"
},
{
"binary_version": "4.15.0-1001.1",
"binary_name": "linux-gcp-fips-headers-4.15.0-1001"
},
{
"binary_version": "4.15.0-1001.1",
"binary_name": "linux-gcp-fips-tools-4.15.0-1001"
},
{
"binary_version": "4.15.0-1001.1",
"binary_name": "linux-headers-4.15.0-1001-gcp-fips"
},
{
"binary_version": "4.15.0-1001.1",
"binary_name": "linux-image-unsigned-4.15.0-1001-gcp-fips"
},
{
"binary_version": "4.15.0-1001.1",
"binary_name": "linux-image-unsigned-hmac-4.15.0-1001-gcp-fips"
},
{
"binary_version": "4.15.0-1001.1",
"binary_name": "linux-modules-4.15.0-1001-gcp-fips"
},
{
"binary_version": "4.15.0-1001.1",
"binary_name": "linux-modules-extra-4.15.0-1001-gcp-fips"
},
{
"binary_version": "4.15.0-1001.1",
"binary_name": "linux-tools-4.15.0-1001-gcp-fips"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.4.0-1021.21+fips2",
"binary_name": "linux-aws-fips-headers-5.4.0-1021"
},
{
"binary_version": "5.4.0-1021.21+fips2",
"binary_name": "linux-aws-fips-tools-5.4.0-1021"
},
{
"binary_version": "5.4.0-1021.21+fips2",
"binary_name": "linux-buildinfo-5.4.0-1021-aws-fips"
},
{
"binary_version": "5.4.0-1021.21+fips2",
"binary_name": "linux-headers-5.4.0-1021-aws-fips"
},
{
"binary_version": "5.4.0-1021.21+fips2",
"binary_name": "linux-image-unsigned-5.4.0-1021-aws-fips"
},
{
"binary_version": "5.4.0-1021.21+fips2",
"binary_name": "linux-image-unsigned-hmac-5.4.0-1021-aws-fips"
},
{
"binary_version": "5.4.0-1021.21+fips2",
"binary_name": "linux-modules-5.4.0-1021-aws-fips"
},
{
"binary_version": "5.4.0-1021.21+fips2",
"binary_name": "linux-modules-extra-5.4.0-1021-aws-fips"
},
{
"binary_version": "5.4.0-1021.21+fips2",
"binary_name": "linux-tools-5.4.0-1021-aws-fips"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.4.0-1022.22+fips1",
"binary_name": "linux-azure-fips-cloud-tools-5.4.0-1022"
},
{
"binary_version": "5.4.0-1022.22+fips1",
"binary_name": "linux-azure-fips-headers-5.4.0-1022"
},
{
"binary_version": "5.4.0-1022.22+fips1",
"binary_name": "linux-azure-fips-tools-5.4.0-1022"
},
{
"binary_version": "5.4.0-1022.22+fips1",
"binary_name": "linux-buildinfo-5.4.0-1022-azure-fips"
},
{
"binary_version": "5.4.0-1022.22+fips1",
"binary_name": "linux-cloud-tools-5.4.0-1022-azure-fips"
},
{
"binary_version": "5.4.0-1022.22+fips1",
"binary_name": "linux-headers-5.4.0-1022-azure-fips"
},
{
"binary_version": "5.4.0-1022.22+fips1",
"binary_name": "linux-image-unsigned-5.4.0-1022-azure-fips"
},
{
"binary_version": "5.4.0-1022.22+fips1",
"binary_name": "linux-image-unsigned-hmac-5.4.0-1022-azure-fips"
},
{
"binary_version": "5.4.0-1022.22+fips1",
"binary_name": "linux-modules-5.4.0-1022-azure-fips"
},
{
"binary_version": "5.4.0-1022.22+fips1",
"binary_name": "linux-modules-extra-5.4.0-1022-azure-fips"
},
{
"binary_version": "5.4.0-1022.22+fips1",
"binary_name": "linux-tools-5.4.0-1022-azure-fips"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.4.0-1007.8",
"binary_name": "linux-buildinfo-5.4.0-1007-fips"
},
{
"binary_version": "5.4.0-1007.8",
"binary_name": "linux-fips-headers-5.4.0-1007"
},
{
"binary_version": "5.4.0-1007.8",
"binary_name": "linux-fips-tools-5.4.0-1007"
},
{
"binary_version": "5.4.0-1007.8",
"binary_name": "linux-fips-tools-host"
},
{
"binary_version": "5.4.0-1007.8",
"binary_name": "linux-headers-5.4.0-1007-fips"
},
{
"binary_version": "5.4.0-1007.8",
"binary_name": "linux-image-unsigned-5.4.0-1007-fips"
},
{
"binary_version": "5.4.0-1007.8",
"binary_name": "linux-image-unsigned-hmac-5.4.0-1007-fips"
},
{
"binary_version": "5.4.0-1007.8",
"binary_name": "linux-modules-5.4.0-1007-fips"
},
{
"binary_version": "5.4.0-1007.8",
"binary_name": "linux-modules-extra-5.4.0-1007-fips"
},
{
"binary_version": "5.4.0-1007.8",
"binary_name": "linux-tools-5.4.0-1007-fips"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}{
"binaries": [
{
"binary_version": "5.4.0-1021.21+fips1",
"binary_name": "linux-buildinfo-5.4.0-1021-gcp-fips"
},
{
"binary_version": "5.4.0-1021.21+fips1",
"binary_name": "linux-gcp-fips-headers-5.4.0-1021"
},
{
"binary_version": "5.4.0-1021.21+fips1",
"binary_name": "linux-gcp-fips-tools-5.4.0-1021"
},
{
"binary_version": "5.4.0-1021.21+fips1",
"binary_name": "linux-headers-5.4.0-1021-gcp-fips"
},
{
"binary_version": "5.4.0-1021.21+fips1",
"binary_name": "linux-image-unsigned-5.4.0-1021-gcp-fips"
},
{
"binary_version": "5.4.0-1021.21+fips1",
"binary_name": "linux-image-unsigned-hmac-5.4.0-1021-gcp-fips"
},
{
"binary_version": "5.4.0-1021.21+fips1",
"binary_name": "linux-modules-5.4.0-1021-gcp-fips"
},
{
"binary_version": "5.4.0-1021.21+fips1",
"binary_name": "linux-modules-extra-5.4.0-1021-gcp-fips"
},
{
"binary_version": "5.4.0-1021.21+fips1",
"binary_name": "linux-tools-5.4.0-1021-gcp-fips"
}
],
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it."
}