In the Linux kernel, the following vulnerability has been resolved: nfc: nci: add flushworkqueue to prevent uaf Our detector found a concurrent use-after-free bug when detaching an NCI device. The main reason for this bug is the unexpected scheduling between the used delayed mechanism (timer and workqueue). The race can be demonstrated below: Thread-1 Thread-2 | ncidevup() | nciopendevice() | _ncirequest(nciresetreq) | ncisendcmd | queuework(cmdwork) nciunregisterdevice() | nciclosedevice() | ... deltimersync(cmdtimer)[1] | ... | Worker ncifreedevice() | ncicmdwork() kfree(ndev)[3] | modtimer(cmdtimer)[2] In short, the cleanup routine thought that the cmdtimer has already been detached by [1] but the modtimer can re-attach the timer [2], even it is already released [3], resulting in UAF. This UAF is easy to trigger, crash trace by POC is like below [ 66.703713] ================================================================== [ 66.703974] BUG: KASAN: use-after-free in enqueuetimer+0x448/0x490 [ 66.703974] Write of size 8 at addr ffff888009fb7058 by task kworker/u4:1/33 [ 66.703974] [ 66.703974] CPU: 1 PID: 33 Comm: kworker/u4:1 Not tainted 5.18.0-rc2 #5 [ 66.703974] Workqueue: nfc2ncicmdwq ncicmdwork [ 66.703974] Call Trace: [ 66.703974] <TASK> [ 66.703974] dumpstacklvl+0x57/0x7d [ 66.703974] printreport.cold+0x5e/0x5db [ 66.703974] ? enqueuetimer+0x448/0x490 [ 66.703974] kasanreport+0xbe/0x1c0 [ 66.703974] ? enqueuetimer+0x448/0x490 [ 66.703974] enqueuetimer+0x448/0x490 [ 66.703974] _modtimer+0x5e6/0xb80 [ 66.703974] ? markheldlocks+0x9e/0xe0 [ 66.703974] ? trytodeltimersync+0xf0/0xf0 [ 66.703974] ? lockdephardirqsonprepare+0x17b/0x410 [ 66.703974] ? queueworkon+0x61/0x80 [ 66.703974] ? lockdephardirqson+0xbf/0x130 [ 66.703974] processonework+0x8bb/0x1510 [ 66.703974] ? lockdephardirqsonprepare+0x410/0x410 [ 66.703974] ? pwqdecnrinflight+0x230/0x230 [ 66.703974] ? rwlockbug.part.0+0x90/0x90 [ 66.703974] ? rawspinlockirq+0x41/0x50 [ 66.703974] workerthread+0x575/0x1190 [ 66.703974] ? processonework+0x1510/0x1510 [ 66.703974] kthread+0x2a0/0x340 [ 66.703974] ? kthreadcompleteandexit+0x20/0x20 [ 66.703974] retfromfork+0x22/0x30 [ 66.703974] </TASK> [ 66.703974] [ 66.703974] Allocated by task 267: [ 66.703974] kasansavestack+0x1e/0x40 [ 66.703974] _kasankmalloc+0x81/0xa0 [ 66.703974] nciallocatedevice+0xd3/0x390 [ 66.703974] nfcmrvlnciregisterdev+0x183/0x2c0 [ 66.703974] nfcmrvlnciuartopen+0xf2/0x1dd [ 66.703974] nciuartttyioctl+0x2c3/0x4a0 [ 66.703974] ttyioctl+0x764/0x1310 [ 66.703974] _x64sysioctl+0x122/0x190 [ 66.703974] dosyscall64+0x3b/0x90 [ 66.703974] entrySYSCALL64afterhwframe+0x44/0xae [ 66.703974] [ 66.703974] Freed by task 406: [ 66.703974] kasansavestack+0x1e/0x40 [ 66.703974] kasansettrack+0x21/0x30 [ 66.703974] kasansetfreeinfo+0x20/0x30 [ 66.703974] _kasanslabfree+0x108/0x170 [ 66.703974] kfree+0xb0/0x330 [ 66.703974] nfcmrvlnciunregisterdev+0x90/0xd0 [ 66.703974] nciuartttyclose+0xdf/0x180 [ 66.703974] ttyldisckill+0x73/0x110 [ 66.703974] ttyldischangup+0x281/0x5b0 [ 66.703974] _ttyhangup.part.0+0x431/0x890 [ 66.703974] ttyrelease+0x3a8/0xc80 [ 66.703974] _fput+0x1f0/0x8c0 [ 66.703974] taskworkrun+0xc9/0x170 [ 66.703974] exittousermodeprepare+0x194/0x1a0 [ 66.703974] syscallexittousermode+0x19/0x50 [ 66.703974] dosyscall64+0x48/0x90 [ 66.703974] entrySYSCALL64after_hwframe+0x44/0x ---truncated---
{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "block-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "block-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "crypto-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "crypto-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "dasd-extra-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "dasd-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "fat-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "fat-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "fb-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "firewire-core-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "floppy-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "fs-core-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "fs-core-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "fs-secondary-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "fs-secondary-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "input-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "input-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "ipmi-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "ipmi-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "irda-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "irda-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "kernel-image-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "kernel-image-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-cloud-tools-4.15.0-23-generic",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-cloud-tools-4.15.0-23-lowlatency",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-23",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-23-generic",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-23-generic-lpae",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-23-lowlatency",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-hwe-edge-cloud-tools-4.15.0-23",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-hwe-edge-tools-4.15.0-23",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-hwe-edge-udebs-generic",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-hwe-edge-udebs-generic-lpae",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-image-4.15.0-23-generic",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-image-4.15.0-23-generic-lpae",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-image-4.15.0-23-lowlatency",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-23-generic",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-23-lowlatency",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-23-generic",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-23-generic-lpae",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-23-lowlatency",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-modules-extra-4.15.0-23-generic",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-source-4.15.0",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-23-generic",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-23-generic-lpae",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-23-lowlatency",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "md-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "md-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "message-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "mouse-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "mouse-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "multipath-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "multipath-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nfs-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nfs-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nic-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nic-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nic-pcmcia-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nic-shared-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nic-shared-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nic-usb-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "nic-usb-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "parport-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "parport-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "pata-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "pcmcia-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "pcmcia-storage-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "plip-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "plip-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "ppp-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "ppp-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "sata-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "sata-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "scsi-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "scsi-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "serial-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "storage-core-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "storage-core-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "usb-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "usb-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "virtio-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "vlan-modules-4.15.0-23-generic-di",
"binary_version": "4.15.0-23.25~16.04.1"
},
{
"binary_name": "vlan-modules-4.15.0-23-generic-lpae-di",
"binary_version": "4.15.0-23.25~16.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "block-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "block-modules-4.15.0-189-generic-lpae-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "crypto-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "crypto-modules-4.15.0-189-generic-lpae-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "dasd-extra-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "dasd-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "fat-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "fat-modules-4.15.0-189-generic-lpae-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "fb-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "firewire-core-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "floppy-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "fs-core-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "fs-core-modules-4.15.0-189-generic-lpae-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "fs-secondary-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "fs-secondary-modules-4.15.0-189-generic-lpae-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "input-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "input-modules-4.15.0-189-generic-lpae-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "ipmi-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "ipmi-modules-4.15.0-189-generic-lpae-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "irda-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "irda-modules-4.15.0-189-generic-lpae-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "kernel-image-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "kernel-image-4.15.0-189-generic-lpae-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-buildinfo-4.15.0-189-generic",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-buildinfo-4.15.0-189-generic-lpae",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-buildinfo-4.15.0-189-lowlatency",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-cloud-tools-4.15.0-189",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-cloud-tools-4.15.0-189-generic",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-cloud-tools-4.15.0-189-lowlatency",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-cloud-tools-common",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-headers-4.15.0-189",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-headers-4.15.0-189-generic",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-headers-4.15.0-189-generic-lpae",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-headers-4.15.0-189-lowlatency",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-image-4.15.0-189-generic",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-image-4.15.0-189-generic-lpae",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-image-4.15.0-189-lowlatency",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-image-unsigned-4.15.0-189-generic",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-image-unsigned-4.15.0-189-lowlatency",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-libc-dev",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-modules-4.15.0-189-generic",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-modules-4.15.0-189-generic-lpae",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-modules-4.15.0-189-lowlatency",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-modules-extra-4.15.0-189-generic",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-source-4.15.0",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-tools-4.15.0-189",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-tools-4.15.0-189-generic",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-tools-4.15.0-189-generic-lpae",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-tools-4.15.0-189-lowlatency",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-tools-common",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-tools-host",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-udebs-generic",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "linux-udebs-generic-lpae",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "md-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "md-modules-4.15.0-189-generic-lpae-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "message-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "mouse-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "mouse-modules-4.15.0-189-generic-lpae-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "multipath-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "multipath-modules-4.15.0-189-generic-lpae-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "nfs-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "nfs-modules-4.15.0-189-generic-lpae-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "nic-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "nic-modules-4.15.0-189-generic-lpae-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "nic-pcmcia-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "nic-shared-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "nic-shared-modules-4.15.0-189-generic-lpae-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "nic-usb-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "nic-usb-modules-4.15.0-189-generic-lpae-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "parport-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "parport-modules-4.15.0-189-generic-lpae-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "pata-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "pcmcia-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "pcmcia-storage-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "plip-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "plip-modules-4.15.0-189-generic-lpae-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "ppp-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "ppp-modules-4.15.0-189-generic-lpae-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "sata-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "sata-modules-4.15.0-189-generic-lpae-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "scsi-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "scsi-modules-4.15.0-189-generic-lpae-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "serial-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "storage-core-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "storage-core-modules-4.15.0-189-generic-lpae-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "usb-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "usb-modules-4.15.0-189-generic-lpae-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "virtio-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "vlan-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200"
},
{
"binary_name": "vlan-modules-4.15.0-189-generic-lpae-di",
"binary_version": "4.15.0-189.200"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-aws-cloud-tools-4.15.0-1137",
"binary_version": "4.15.0-1137.148"
},
{
"binary_name": "linux-aws-headers-4.15.0-1137",
"binary_version": "4.15.0-1137.148"
},
{
"binary_name": "linux-aws-tools-4.15.0-1137",
"binary_version": "4.15.0-1137.148"
},
{
"binary_name": "linux-buildinfo-4.15.0-1137-aws",
"binary_version": "4.15.0-1137.148"
},
{
"binary_name": "linux-cloud-tools-4.15.0-1137-aws",
"binary_version": "4.15.0-1137.148"
},
{
"binary_name": "linux-headers-4.15.0-1137-aws",
"binary_version": "4.15.0-1137.148"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1137-aws",
"binary_version": "4.15.0-1137.148"
},
{
"binary_name": "linux-modules-4.15.0-1137-aws",
"binary_version": "4.15.0-1137.148"
},
{
"binary_name": "linux-modules-extra-4.15.0-1137-aws",
"binary_version": "4.15.0-1137.148"
},
{
"binary_name": "linux-tools-4.15.0-1137-aws",
"binary_version": "4.15.0-1137.148"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-aws-5.4-cloud-tools-5.4.0-1081",
"binary_version": "5.4.0-1081.88~18.04.1"
},
{
"binary_name": "linux-aws-5.4-headers-5.4.0-1081",
"binary_version": "5.4.0-1081.88~18.04.1"
},
{
"binary_name": "linux-aws-5.4-tools-5.4.0-1081",
"binary_version": "5.4.0-1081.88~18.04.1"
},
{
"binary_name": "linux-buildinfo-5.4.0-1081-aws",
"binary_version": "5.4.0-1081.88~18.04.1"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1081-aws",
"binary_version": "5.4.0-1081.88~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1081-aws",
"binary_version": "5.4.0-1081.88~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1081-aws",
"binary_version": "5.4.0-1081.88~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1081-aws",
"binary_version": "5.4.0-1081.88~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1081-aws",
"binary_version": "5.4.0-1081.88~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1081-aws",
"binary_version": "5.4.0-1081.88~18.04.1"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-azure-4.15-cloud-tools-4.15.0-1146",
"binary_version": "4.15.0-1146.161"
},
{
"binary_name": "linux-azure-4.15-headers-4.15.0-1146",
"binary_version": "4.15.0-1146.161"
},
{
"binary_name": "linux-azure-4.15-tools-4.15.0-1146",
"binary_version": "4.15.0-1146.161"
},
{
"binary_name": "linux-buildinfo-4.15.0-1146-azure",
"binary_version": "4.15.0-1146.161"
},
{
"binary_name": "linux-cloud-tools-4.15.0-1146-azure",
"binary_version": "4.15.0-1146.161"
},
{
"binary_name": "linux-headers-4.15.0-1146-azure",
"binary_version": "4.15.0-1146.161"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1146-azure",
"binary_version": "4.15.0-1146.161"
},
{
"binary_name": "linux-modules-4.15.0-1146-azure",
"binary_version": "4.15.0-1146.161"
},
{
"binary_name": "linux-modules-extra-4.15.0-1146-azure",
"binary_version": "4.15.0-1146.161"
},
{
"binary_name": "linux-tools-4.15.0-1146-azure",
"binary_version": "4.15.0-1146.161"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-azure-5.4-cloud-tools-5.4.0-1086",
"binary_version": "5.4.0-1086.91~18.04.1"
},
{
"binary_name": "linux-azure-5.4-headers-5.4.0-1086",
"binary_version": "5.4.0-1086.91~18.04.1"
},
{
"binary_name": "linux-azure-5.4-tools-5.4.0-1086",
"binary_version": "5.4.0-1086.91~18.04.1"
},
{
"binary_name": "linux-buildinfo-5.4.0-1086-azure",
"binary_version": "5.4.0-1086.91~18.04.1"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1086-azure",
"binary_version": "5.4.0-1086.91~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1086-azure",
"binary_version": "5.4.0-1086.91~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1086-azure",
"binary_version": "5.4.0-1086.91~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1086-azure",
"binary_version": "5.4.0-1086.91~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1086-azure",
"binary_version": "5.4.0-1086.91~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1086-azure",
"binary_version": "5.4.0-1086.91~18.04.1"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1131-gcp",
"binary_version": "4.15.0-1131.147"
},
{
"binary_name": "linux-gcp-4.15-headers-4.15.0-1131",
"binary_version": "4.15.0-1131.147"
},
{
"binary_name": "linux-gcp-4.15-tools-4.15.0-1131",
"binary_version": "4.15.0-1131.147"
},
{
"binary_name": "linux-headers-4.15.0-1131-gcp",
"binary_version": "4.15.0-1131.147"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1131-gcp",
"binary_version": "4.15.0-1131.147"
},
{
"binary_name": "linux-modules-4.15.0-1131-gcp",
"binary_version": "4.15.0-1131.147"
},
{
"binary_name": "linux-modules-extra-4.15.0-1131-gcp",
"binary_version": "4.15.0-1131.147"
},
{
"binary_name": "linux-tools-4.15.0-1131-gcp",
"binary_version": "4.15.0-1131.147"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1084-gcp",
"binary_version": "5.4.0-1084.92~18.04.1"
},
{
"binary_name": "linux-gcp-5.4-headers-5.4.0-1084",
"binary_version": "5.4.0-1084.92~18.04.1"
},
{
"binary_name": "linux-gcp-5.4-tools-5.4.0-1084",
"binary_version": "5.4.0-1084.92~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1084-gcp",
"binary_version": "5.4.0-1084.92~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1084-gcp",
"binary_version": "5.4.0-1084.92~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1084-gcp",
"binary_version": "5.4.0-1084.92~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1084-gcp",
"binary_version": "5.4.0-1084.92~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1084-gcp",
"binary_version": "5.4.0-1084.92~18.04.1"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "block-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "block-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "crypto-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "crypto-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "dasd-extra-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "dasd-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "fat-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "fat-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "fb-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "firewire-core-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "floppy-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "fs-core-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "fs-core-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "fs-secondary-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "fs-secondary-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "input-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "input-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "ipmi-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "ipmi-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "kernel-image-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "kernel-image-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-buildinfo-5.4.0-122-generic",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-buildinfo-5.4.0-122-generic-lpae",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-buildinfo-5.4.0-122-lowlatency",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-cloud-tools-5.4.0-122-generic",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-cloud-tools-5.4.0-122-lowlatency",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-122-generic",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-122-generic-lpae",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-122-lowlatency",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-hwe-5.4-cloud-tools-5.4.0-122",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-hwe-5.4-cloud-tools-common",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-hwe-5.4-headers-5.4.0-122",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-hwe-5.4-source-5.4.0",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-hwe-5.4-tools-5.4.0-122",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-hwe-5.4-tools-common",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-hwe-5.4-udebs-generic",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-hwe-5.4-udebs-generic-lpae",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-image-5.4.0-122-generic",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-image-5.4.0-122-generic-lpae",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-image-5.4.0-122-lowlatency",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-122-generic",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-122-lowlatency",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-122-generic",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-122-generic-lpae",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-122-lowlatency",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-122-generic",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-122-generic",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-122-generic-lpae",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-122-lowlatency",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "md-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "md-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "message-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "mouse-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "mouse-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "multipath-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "multipath-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "nfs-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "nfs-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "nic-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "nic-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "nic-pcmcia-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "nic-shared-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "nic-shared-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "nic-usb-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "nic-usb-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "parport-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "parport-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "pata-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "pcmcia-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "pcmcia-storage-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "plip-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "plip-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "ppp-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "ppp-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "sata-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "sata-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "scsi-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "scsi-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "serial-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "storage-core-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "storage-core-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "usb-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "usb-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "virtio-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "vlan-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138~18.04.1"
},
{
"binary_name": "vlan-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138~18.04.1"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1029-ibm",
"binary_version": "5.4.0-1029.33~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1029-ibm",
"binary_version": "5.4.0-1029.33~18.04.1"
},
{
"binary_name": "linux-ibm-5.4-cloud-tools-common",
"binary_version": "5.4.0-1029.33~18.04.1"
},
{
"binary_name": "linux-ibm-5.4-headers-5.4.0-1029",
"binary_version": "5.4.0-1029.33~18.04.1"
},
{
"binary_name": "linux-ibm-5.4-source-5.4.0",
"binary_version": "5.4.0-1029.33~18.04.1"
},
{
"binary_name": "linux-ibm-5.4-tools-5.4.0-1029",
"binary_version": "5.4.0-1029.33~18.04.1"
},
{
"binary_name": "linux-ibm-5.4-tools-common",
"binary_version": "5.4.0-1029.33~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1029-ibm",
"binary_version": "5.4.0-1029.33~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1029-ibm",
"binary_version": "5.4.0-1029.33~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1029-ibm",
"binary_version": "5.4.0-1029.33~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1029-ibm",
"binary_version": "5.4.0-1029.33~18.04.1"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1123-kvm",
"binary_version": "4.15.0-1123.128"
},
{
"binary_name": "linux-headers-4.15.0-1123-kvm",
"binary_version": "4.15.0-1123.128"
},
{
"binary_name": "linux-image-4.15.0-1123-kvm",
"binary_version": "4.15.0-1123.128"
},
{
"binary_name": "linux-kvm-headers-4.15.0-1123",
"binary_version": "4.15.0-1123.128"
},
{
"binary_name": "linux-kvm-tools-4.15.0-1123",
"binary_version": "4.15.0-1123.128"
},
{
"binary_name": "linux-modules-4.15.0-1123-kvm",
"binary_version": "4.15.0-1123.128"
},
{
"binary_name": "linux-tools-4.15.0-1123-kvm",
"binary_version": "4.15.0-1123.128"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1102-oracle",
"binary_version": "4.15.0-1102.113"
},
{
"binary_name": "linux-headers-4.15.0-1102-oracle",
"binary_version": "4.15.0-1102.113"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1102-oracle",
"binary_version": "4.15.0-1102.113"
},
{
"binary_name": "linux-modules-4.15.0-1102-oracle",
"binary_version": "4.15.0-1102.113"
},
{
"binary_name": "linux-modules-extra-4.15.0-1102-oracle",
"binary_version": "4.15.0-1102.113"
},
{
"binary_name": "linux-oracle-headers-4.15.0-1102",
"binary_version": "4.15.0-1102.113"
},
{
"binary_name": "linux-oracle-tools-4.15.0-1102",
"binary_version": "4.15.0-1102.113"
},
{
"binary_name": "linux-tools-4.15.0-1102-oracle",
"binary_version": "4.15.0-1102.113"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1079-oracle",
"binary_version": "5.4.0-1079.87~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1079-oracle",
"binary_version": "5.4.0-1079.87~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1079-oracle",
"binary_version": "5.4.0-1079.87~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1079-oracle",
"binary_version": "5.4.0-1079.87~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1079-oracle",
"binary_version": "5.4.0-1079.87~18.04.1"
},
{
"binary_name": "linux-oracle-5.4-headers-5.4.0-1079",
"binary_version": "5.4.0-1079.87~18.04.1"
},
{
"binary_name": "linux-oracle-5.4-tools-5.4.0-1079",
"binary_version": "5.4.0-1079.87~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1079-oracle",
"binary_version": "5.4.0-1079.87~18.04.1"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1066-raspi",
"binary_version": "5.4.0-1066.76~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1066-raspi",
"binary_version": "5.4.0-1066.76~18.04.1"
},
{
"binary_name": "linux-image-5.4.0-1066-raspi",
"binary_version": "5.4.0-1066.76~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1066-raspi",
"binary_version": "5.4.0-1066.76~18.04.1"
},
{
"binary_name": "linux-raspi-5.4-headers-5.4.0-1066",
"binary_version": "5.4.0-1066.76~18.04.1"
},
{
"binary_name": "linux-raspi-5.4-tools-5.4.0-1066",
"binary_version": "5.4.0-1066.76~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1066-raspi",
"binary_version": "5.4.0-1066.76~18.04.1"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-aws-5.0-tools-5.0.0-1027",
"binary_version": "5.0.0-1027.30"
},
{
"binary_name": "linux-aws-headers-5.0.0-1027",
"binary_version": "5.0.0-1027.30"
},
{
"binary_name": "linux-buildinfo-5.0.0-1027-aws",
"binary_version": "5.0.0-1027.30"
},
{
"binary_name": "linux-cloud-tools-5.0.0-1027-aws",
"binary_version": "5.0.0-1027.30"
},
{
"binary_name": "linux-headers-5.0.0-1027-aws",
"binary_version": "5.0.0-1027.30"
},
{
"binary_name": "linux-image-5.0.0-1027-aws",
"binary_version": "5.0.0-1027.30"
},
{
"binary_name": "linux-modules-5.0.0-1027-aws",
"binary_version": "5.0.0-1027.30"
},
{
"binary_name": "linux-modules-extra-5.0.0-1027-aws",
"binary_version": "5.0.0-1027.30"
},
{
"binary_name": "linux-tools-5.0.0-1027-aws",
"binary_version": "5.0.0-1027.30"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-aws-5.3-cloud-tools-5.3.0-1035",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-aws-5.3-headers-5.3.0-1035",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-aws-5.3-tools-5.3.0-1035",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-buildinfo-5.3.0-1035-aws",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-cloud-tools-5.3.0-1035-aws",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-headers-5.3.0-1035-aws",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-image-5.3.0-1035-aws",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-modules-5.3.0-1035-aws",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-modules-extra-5.3.0-1035-aws",
"binary_version": "5.3.0-1035.37"
},
{
"binary_name": "linux-tools-5.3.0-1035-aws",
"binary_version": "5.3.0-1035.37"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-azure-cloud-tools-5.0.0-1036",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-azure-headers-5.0.0-1036",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-azure-tools-5.0.0-1036",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-buildinfo-5.0.0-1036-azure",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-cloud-tools-5.0.0-1036-azure",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-headers-5.0.0-1036-azure",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-image-unsigned-5.0.0-1036-azure",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-modules-5.0.0-1036-azure",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-modules-extra-5.0.0-1036-azure",
"binary_version": "5.0.0-1036.38"
},
{
"binary_name": "linux-tools-5.0.0-1036-azure",
"binary_version": "5.0.0-1036.38"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-azure-5.3-cloud-tools-5.3.0-1035",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-azure-5.3-headers-5.3.0-1035",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-azure-5.3-tools-5.3.0-1035",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-buildinfo-5.3.0-1035-azure",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-cloud-tools-5.3.0-1035-azure",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-headers-5.3.0-1035-azure",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-image-unsigned-5.3.0-1035-azure",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-modules-5.3.0-1035-azure",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-modules-extra-5.3.0-1035-azure",
"binary_version": "5.3.0-1035.36"
},
{
"binary_name": "linux-tools-5.3.0-1035-azure",
"binary_version": "5.3.0-1035.36"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-azure-edge-cloud-tools-5.0.0-1012",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-azure-edge-tools-5.0.0-1012",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-azure-headers-5.0.0-1012",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-buildinfo-5.0.0-1012-azure",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-cloud-tools-5.0.0-1012-azure",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-headers-5.0.0-1012-azure",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-image-unsigned-5.0.0-1012-azure",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-modules-5.0.0-1012-azure",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-modules-extra-5.0.0-1012-azure",
"binary_version": "5.0.0-1012.12~18.04.2"
},
{
"binary_name": "linux-tools-5.0.0-1012-azure",
"binary_version": "5.0.0-1012.12~18.04.2"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.0.0-1034-gcp",
"binary_version": "5.0.0-1034.35"
},
{
"binary_name": "linux-gcp-headers-5.0.0-1034",
"binary_version": "5.0.0-1034.35"
},
{
"binary_name": "linux-gcp-tools-5.0.0-1034",
"binary_version": "5.0.0-1034.35"
},
{
"binary_name": "linux-headers-5.0.0-1034-gcp",
"binary_version": "5.0.0-1034.35"
},
{
"binary_name": "linux-image-unsigned-5.0.0-1034-gcp",
"binary_version": "5.0.0-1034.35"
},
{
"binary_name": "linux-modules-5.0.0-1034-gcp",
"binary_version": "5.0.0-1034.35"
},
{
"binary_name": "linux-modules-extra-5.0.0-1034-gcp",
"binary_version": "5.0.0-1034.35"
},
{
"binary_name": "linux-tools-5.0.0-1034-gcp",
"binary_version": "5.0.0-1034.35"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.3.0-1032-gcp",
"binary_version": "5.3.0-1032.34~18.04.1"
},
{
"binary_name": "linux-gcp-5.3-headers-5.3.0-1032",
"binary_version": "5.3.0-1032.34~18.04.1"
},
{
"binary_name": "linux-gcp-5.3-tools-5.3.0-1032",
"binary_version": "5.3.0-1032.34~18.04.1"
},
{
"binary_name": "linux-headers-5.3.0-1032-gcp",
"binary_version": "5.3.0-1032.34~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.3.0-1032-gcp",
"binary_version": "5.3.0-1032.34~18.04.1"
},
{
"binary_name": "linux-modules-5.3.0-1032-gcp",
"binary_version": "5.3.0-1032.34~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.3.0-1032-gcp",
"binary_version": "5.3.0-1032.34~18.04.1"
},
{
"binary_name": "linux-tools-5.3.0-1032-gcp",
"binary_version": "5.3.0-1032.34~18.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1079-gke",
"binary_version": "4.15.0-1079.84"
},
{
"binary_name": "linux-gke-4.15-headers-4.15.0-1079",
"binary_version": "4.15.0-1079.84"
},
{
"binary_name": "linux-gke-4.15-tools-4.15.0-1079",
"binary_version": "4.15.0-1079.84"
},
{
"binary_name": "linux-headers-4.15.0-1079-gke",
"binary_version": "4.15.0-1079.84"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1079-gke",
"binary_version": "4.15.0-1079.84"
},
{
"binary_name": "linux-modules-4.15.0-1079-gke",
"binary_version": "4.15.0-1079.84"
},
{
"binary_name": "linux-modules-extra-4.15.0-1079-gke",
"binary_version": "4.15.0-1079.84"
},
{
"binary_name": "linux-tools-4.15.0-1079-gke",
"binary_version": "4.15.0-1079.84"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1080-gke",
"binary_version": "5.4.0-1080.86~18.04.1"
},
{
"binary_name": "linux-gke-5.4-headers-5.4.0-1080",
"binary_version": "5.4.0-1080.86~18.04.1"
},
{
"binary_name": "linux-gke-5.4-tools-5.4.0-1080",
"binary_version": "5.4.0-1080.86~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1080-gke",
"binary_version": "5.4.0-1080.86~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1080-gke",
"binary_version": "5.4.0-1080.86~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1080-gke",
"binary_version": "5.4.0-1080.86~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1080-gke",
"binary_version": "5.4.0-1080.86~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1080-gke",
"binary_version": "5.4.0-1080.86~18.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1051-gkeop",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1051-gkeop",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-gkeop-5.4-cloud-tools-5.4.0-1051",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-gkeop-5.4-headers-5.4.0-1051",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-gkeop-5.4-source-5.4.0",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-gkeop-5.4-tools-5.4.0-1051",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-headers-5.4.0-1051-gkeop",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1051-gkeop",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-modules-5.4.0-1051-gkeop",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1051-gkeop",
"binary_version": "5.4.0-1051.54~18.04.1"
},
{
"binary_name": "linux-tools-5.4.0-1051-gkeop",
"binary_version": "5.4.0-1051.54~18.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "block-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "crypto-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "fat-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "fb-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "firewire-core-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "floppy-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "fs-core-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "fs-secondary-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "input-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "ipmi-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "kernel-image-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-buildinfo-5.3.0-76-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-buildinfo-5.3.0-76-lowlatency",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-cloud-tools-5.3.0-76-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-cloud-tools-5.3.0-76-lowlatency",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-headers-5.3.0-76-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-headers-5.3.0-76-lowlatency",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-hwe-cloud-tools-5.3.0-76",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-hwe-headers-5.3.0-76",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-hwe-tools-5.3.0-76",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-hwe-udebs-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-image-5.3.0-76-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-image-5.3.0-76-lowlatency",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-image-unsigned-5.3.0-76-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-image-unsigned-5.3.0-76-lowlatency",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-modules-5.3.0-76-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-modules-5.3.0-76-lowlatency",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-modules-extra-5.3.0-76-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-source-5.3.0",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-tools-5.3.0-76-generic",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "linux-tools-5.3.0-76-lowlatency",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "md-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "message-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "mouse-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "multipath-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "nfs-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "nic-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "nic-pcmcia-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "nic-shared-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "nic-usb-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "parport-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "pata-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "pcmcia-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "pcmcia-storage-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "plip-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "ppp-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "sata-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "scsi-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "serial-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "storage-core-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "usb-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "virtio-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
},
{
"binary_name": "vlan-modules-5.3.0-76-generic-di",
"binary_version": "5.3.0-76.72"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "block-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "block-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "crypto-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "crypto-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "dasd-extra-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "dasd-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "fat-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "fat-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "fb-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "firewire-core-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "floppy-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "fs-core-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "fs-core-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "fs-secondary-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "fs-secondary-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "input-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "input-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "ipmi-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "ipmi-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "kernel-image-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "kernel-image-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-buildinfo-5.3.0-24-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-buildinfo-5.3.0-24-generic-lpae",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-buildinfo-5.3.0-24-lowlatency",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-cloud-tools-5.3.0-24-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-cloud-tools-5.3.0-24-lowlatency",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-headers-5.3.0-24",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-headers-5.3.0-24-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-headers-5.3.0-24-generic-lpae",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-headers-5.3.0-24-lowlatency",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-hwe-edge-cloud-tools-5.3.0-24",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-hwe-edge-tools-5.3.0-24",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-hwe-edge-udebs-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-hwe-edge-udebs-generic-lpae",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-image-5.3.0-24-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-image-5.3.0-24-generic-lpae",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-image-5.3.0-24-lowlatency",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-image-unsigned-5.3.0-24-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-image-unsigned-5.3.0-24-lowlatency",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-modules-5.3.0-24-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-modules-5.3.0-24-generic-lpae",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-modules-5.3.0-24-lowlatency",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-modules-extra-5.3.0-24-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-source-5.3.0",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-tools-5.3.0-24-generic",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-tools-5.3.0-24-generic-lpae",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "linux-tools-5.3.0-24-lowlatency",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "md-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "md-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "message-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "mouse-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "mouse-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "multipath-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "multipath-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nfs-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nfs-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nic-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nic-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nic-pcmcia-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nic-shared-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nic-shared-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nic-usb-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "nic-usb-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "parport-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "parport-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "pata-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "pcmcia-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "pcmcia-storage-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "plip-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "plip-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "ppp-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "ppp-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "sata-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "sata-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "scsi-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "scsi-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "serial-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "storage-core-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "storage-core-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "usb-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "usb-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "virtio-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "vlan-modules-5.3.0-24-generic-di",
"binary_version": "5.3.0-24.26~18.04.2"
},
{
"binary_name": "vlan-modules-5.3.0-24-generic-lpae-di",
"binary_version": "5.3.0-24.26~18.04.2"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "block-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "crypto-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "fat-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "fb-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "firewire-core-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "floppy-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "fs-core-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "fs-secondary-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "input-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "ipmi-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "irda-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "kernel-image-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "linux-buildinfo-4.15.0-1103-oem",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "linux-headers-4.15.0-1103-oem",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1103-oem",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "linux-modules-4.15.0-1103-oem",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "linux-oem-headers-4.15.0-1103",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "linux-oem-tools-4.15.0-1103",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "linux-tools-4.15.0-1103-oem",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "linux-udebs-oem",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "md-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "message-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "mouse-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "multipath-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "nfs-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "nic-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "nic-pcmcia-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "nic-shared-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "nic-usb-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "parport-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "pata-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "pcmcia-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "pcmcia-storage-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "plip-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "ppp-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "sata-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "scsi-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "serial-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "storage-core-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "usb-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "virtio-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
},
{
"binary_name": "vlan-modules-4.15.0-1103-oem-di",
"binary_version": "4.15.0-1103.114"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.0.0-1014-oracle",
"binary_version": "5.0.0-1014.19"
},
{
"binary_name": "linux-headers-5.0.0-1014-oracle",
"binary_version": "5.0.0-1014.19"
},
{
"binary_name": "linux-image-unsigned-5.0.0-1014-oracle",
"binary_version": "5.0.0-1014.19"
},
{
"binary_name": "linux-modules-5.0.0-1014-oracle",
"binary_version": "5.0.0-1014.19"
},
{
"binary_name": "linux-modules-extra-5.0.0-1014-oracle",
"binary_version": "5.0.0-1014.19"
},
{
"binary_name": "linux-oracle-5.0-headers-5.0.0-1014",
"binary_version": "5.0.0-1014.19"
},
{
"binary_name": "linux-oracle-5.0-tools-5.0.0-1014",
"binary_version": "5.0.0-1014.19"
},
{
"binary_name": "linux-tools-5.0.0-1014-oracle",
"binary_version": "5.0.0-1014.19"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.3.0-1030-oracle",
"binary_version": "5.3.0-1030.32~18.04.1"
},
{
"binary_name": "linux-headers-5.3.0-1030-oracle",
"binary_version": "5.3.0-1030.32~18.04.1"
},
{
"binary_name": "linux-image-unsigned-5.3.0-1030-oracle",
"binary_version": "5.3.0-1030.32~18.04.1"
},
{
"binary_name": "linux-modules-5.3.0-1030-oracle",
"binary_version": "5.3.0-1030.32~18.04.1"
},
{
"binary_name": "linux-modules-extra-5.3.0-1030-oracle",
"binary_version": "5.3.0-1030.32~18.04.1"
},
{
"binary_name": "linux-oracle-5.3-headers-5.3.0-1030",
"binary_version": "5.3.0-1030.32~18.04.1"
},
{
"binary_name": "linux-oracle-5.3-tools-5.3.0-1030",
"binary_version": "5.3.0-1030.32~18.04.1"
},
{
"binary_name": "linux-tools-5.3.0-1030-oracle",
"binary_version": "5.3.0-1030.32~18.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "block-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "block-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "crypto-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "crypto-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "dasd-extra-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "dasd-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "fat-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "fat-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "fb-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "firewire-core-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "floppy-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "fs-core-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "fs-core-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "fs-secondary-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "fs-secondary-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "input-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "input-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "ipmi-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "ipmi-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "kernel-image-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "kernel-image-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-buildinfo-5.4.0-122-generic",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-buildinfo-5.4.0-122-generic-lpae",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-buildinfo-5.4.0-122-lowlatency",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-cloud-tools-5.4.0-122",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-cloud-tools-5.4.0-122-generic",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-cloud-tools-5.4.0-122-lowlatency",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-cloud-tools-common",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-headers-5.4.0-122",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-headers-5.4.0-122-generic",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-headers-5.4.0-122-generic-lpae",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-headers-5.4.0-122-lowlatency",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-image-5.4.0-122-generic",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-image-5.4.0-122-generic-lpae",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-image-unsigned-5.4.0-122-generic",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-image-unsigned-5.4.0-122-lowlatency",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-libc-dev",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-modules-5.4.0-122-generic",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-modules-5.4.0-122-generic-lpae",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-modules-5.4.0-122-lowlatency",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-modules-extra-5.4.0-122-generic",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-source-5.4.0",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-tools-5.4.0-122",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-tools-5.4.0-122-generic",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-tools-5.4.0-122-generic-lpae",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-tools-5.4.0-122-lowlatency",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-tools-common",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-tools-host",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-udebs-generic",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "linux-udebs-generic-lpae",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "md-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "md-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "message-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "mouse-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "mouse-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "multipath-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "multipath-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "nfs-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "nfs-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "nic-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "nic-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "nic-pcmcia-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "nic-shared-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "nic-shared-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "nic-usb-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "nic-usb-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "parport-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "parport-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "pata-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "pcmcia-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "pcmcia-storage-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "plip-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "plip-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "ppp-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "ppp-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "sata-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "sata-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "scsi-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "scsi-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "serial-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "storage-core-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "storage-core-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "usb-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "usb-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "virtio-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "vlan-modules-5.4.0-122-generic-di",
"binary_version": "5.4.0-122.138"
},
{
"binary_name": "vlan-modules-5.4.0-122-generic-lpae-di",
"binary_version": "5.4.0-122.138"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-aws-cloud-tools-5.4.0-1081",
"binary_version": "5.4.0-1081.88"
},
{
"binary_name": "linux-aws-headers-5.4.0-1081",
"binary_version": "5.4.0-1081.88"
},
{
"binary_name": "linux-aws-tools-5.4.0-1081",
"binary_version": "5.4.0-1081.88"
},
{
"binary_name": "linux-buildinfo-5.4.0-1081-aws",
"binary_version": "5.4.0-1081.88"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1081-aws",
"binary_version": "5.4.0-1081.88"
},
{
"binary_name": "linux-headers-5.4.0-1081-aws",
"binary_version": "5.4.0-1081.88"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1081-aws",
"binary_version": "5.4.0-1081.88"
},
{
"binary_name": "linux-modules-5.4.0-1081-aws",
"binary_version": "5.4.0-1081.88"
},
{
"binary_name": "linux-modules-extra-5.4.0-1081-aws",
"binary_version": "5.4.0-1081.88"
},
{
"binary_name": "linux-tools-5.4.0-1081-aws",
"binary_version": "5.4.0-1081.88"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-azure-cloud-tools-5.4.0-1086",
"binary_version": "5.4.0-1086.91"
},
{
"binary_name": "linux-azure-headers-5.4.0-1086",
"binary_version": "5.4.0-1086.91"
},
{
"binary_name": "linux-azure-tools-5.4.0-1086",
"binary_version": "5.4.0-1086.91"
},
{
"binary_name": "linux-buildinfo-5.4.0-1086-azure",
"binary_version": "5.4.0-1086.91"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1086-azure",
"binary_version": "5.4.0-1086.91"
},
{
"binary_name": "linux-headers-5.4.0-1086-azure",
"binary_version": "5.4.0-1086.91"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1086-azure",
"binary_version": "5.4.0-1086.91"
},
{
"binary_name": "linux-modules-5.4.0-1086-azure",
"binary_version": "5.4.0-1086.91"
},
{
"binary_name": "linux-modules-extra-5.4.0-1086-azure",
"binary_version": "5.4.0-1086.91"
},
{
"binary_name": "linux-tools-5.4.0-1086-azure",
"binary_version": "5.4.0-1086.91"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-azure-5.15-cloud-tools-5.15.0-1008",
"binary_version": "5.15.0-1008.9~20.04.1"
},
{
"binary_name": "linux-azure-5.15-headers-5.15.0-1008",
"binary_version": "5.15.0-1008.9~20.04.1"
},
{
"binary_name": "linux-azure-5.15-tools-5.15.0-1008",
"binary_version": "5.15.0-1008.9~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.15.0-1008-azure",
"binary_version": "5.15.0-1008.9~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1008-azure",
"binary_version": "5.15.0-1008.9~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-1008-azure",
"binary_version": "5.15.0-1008.9~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1008-azure",
"binary_version": "5.15.0-1008.9~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-1008-azure",
"binary_version": "5.15.0-1008.9~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1008-azure",
"binary_version": "5.15.0-1008.9~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-1008-azure",
"binary_version": "5.15.0-1008.9~20.04.1"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-bluefield-headers-5.4.0-1042",
"binary_version": "5.4.0-1042.47"
},
{
"binary_name": "linux-bluefield-tools-5.4.0-1042",
"binary_version": "5.4.0-1042.47"
},
{
"binary_name": "linux-buildinfo-5.4.0-1042-bluefield",
"binary_version": "5.4.0-1042.47"
},
{
"binary_name": "linux-headers-5.4.0-1042-bluefield",
"binary_version": "5.4.0-1042.47"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1042-bluefield",
"binary_version": "5.4.0-1042.47"
},
{
"binary_name": "linux-modules-5.4.0-1042-bluefield",
"binary_version": "5.4.0-1042.47"
},
{
"binary_name": "linux-tools-5.4.0-1042-bluefield",
"binary_version": "5.4.0-1042.47"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1084-gcp",
"binary_version": "5.4.0-1084.92"
},
{
"binary_name": "linux-gcp-headers-5.4.0-1084",
"binary_version": "5.4.0-1084.92"
},
{
"binary_name": "linux-gcp-tools-5.4.0-1084",
"binary_version": "5.4.0-1084.92"
},
{
"binary_name": "linux-headers-5.4.0-1084-gcp",
"binary_version": "5.4.0-1084.92"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1084-gcp",
"binary_version": "5.4.0-1084.92"
},
{
"binary_name": "linux-modules-5.4.0-1084-gcp",
"binary_version": "5.4.0-1084.92"
},
{
"binary_name": "linux-modules-extra-5.4.0-1084-gcp",
"binary_version": "5.4.0-1084.92"
},
{
"binary_name": "linux-tools-5.4.0-1084-gcp",
"binary_version": "5.4.0-1084.92"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-41-generic",
"binary_version": "5.15.0-41.44~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.15.0-41-generic-64k",
"binary_version": "5.15.0-41.44~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.15.0-41-generic-lpae",
"binary_version": "5.15.0-41.44~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.15.0-41-generic",
"binary_version": "5.15.0-41.44~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-41-generic",
"binary_version": "5.15.0-41.44~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-41-generic-64k",
"binary_version": "5.15.0-41.44~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-41-generic-lpae",
"binary_version": "5.15.0-41.44~20.04.1"
},
{
"binary_name": "linux-hwe-5.15-cloud-tools-5.15.0-41",
"binary_version": "5.15.0-41.44~20.04.1"
},
{
"binary_name": "linux-hwe-5.15-cloud-tools-common",
"binary_version": "5.15.0-41.44~20.04.1"
},
{
"binary_name": "linux-hwe-5.15-headers-5.15.0-41",
"binary_version": "5.15.0-41.44~20.04.1"
},
{
"binary_name": "linux-hwe-5.15-source-5.15.0",
"binary_version": "5.15.0-41.44~20.04.1"
},
{
"binary_name": "linux-hwe-5.15-tools-5.15.0-41",
"binary_version": "5.15.0-41.44~20.04.1"
},
{
"binary_name": "linux-hwe-5.15-tools-common",
"binary_version": "5.15.0-41.44~20.04.1"
},
{
"binary_name": "linux-hwe-5.15-tools-host",
"binary_version": "5.15.0-41.44~20.04.1"
},
{
"binary_name": "linux-image-5.15.0-41-generic",
"binary_version": "5.15.0-41.44~20.04.1"
},
{
"binary_name": "linux-image-5.15.0-41-generic-lpae",
"binary_version": "5.15.0-41.44~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-41-generic",
"binary_version": "5.15.0-41.44~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-41-generic-64k",
"binary_version": "5.15.0-41.44~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-41-generic",
"binary_version": "5.15.0-41.44~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-41-generic-64k",
"binary_version": "5.15.0-41.44~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-41-generic-lpae",
"binary_version": "5.15.0-41.44~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.15.0-41-generic",
"binary_version": "5.15.0-41.44~20.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-5.15.0-41-generic",
"binary_version": "5.15.0-41.44~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-41-generic",
"binary_version": "5.15.0-41.44~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-41-generic-64k",
"binary_version": "5.15.0-41.44~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-41-generic-lpae",
"binary_version": "5.15.0-41.44~20.04.1"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1029-ibm",
"binary_version": "5.4.0-1029.33"
},
{
"binary_name": "linux-headers-5.4.0-1029-ibm",
"binary_version": "5.4.0-1029.33"
},
{
"binary_name": "linux-ibm-cloud-tools-common",
"binary_version": "5.4.0-1029.33"
},
{
"binary_name": "linux-ibm-headers-5.4.0-1029",
"binary_version": "5.4.0-1029.33"
},
{
"binary_name": "linux-ibm-source-5.4.0",
"binary_version": "5.4.0-1029.33"
},
{
"binary_name": "linux-ibm-tools-5.4.0-1029",
"binary_version": "5.4.0-1029.33"
},
{
"binary_name": "linux-ibm-tools-common",
"binary_version": "5.4.0-1029.33"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1029-ibm",
"binary_version": "5.4.0-1029.33"
},
{
"binary_name": "linux-modules-5.4.0-1029-ibm",
"binary_version": "5.4.0-1029.33"
},
{
"binary_name": "linux-modules-extra-5.4.0-1029-ibm",
"binary_version": "5.4.0-1029.33"
},
{
"binary_name": "linux-tools-5.4.0-1029-ibm",
"binary_version": "5.4.0-1029.33"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1008-intel-iotg",
"binary_version": "5.15.0-1008.11~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1008-intel-iotg",
"binary_version": "5.15.0-1008.11~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-1008-intel-iotg",
"binary_version": "5.15.0-1008.11~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1008-intel-iotg",
"binary_version": "5.15.0-1008.11~20.04.1"
},
{
"binary_name": "linux-intel-iotg-5.15-cloud-tools-5.15.0-1008",
"binary_version": "5.15.0-1008.11~20.04.1"
},
{
"binary_name": "linux-intel-iotg-5.15-cloud-tools-common",
"binary_version": "5.15.0-1008.11~20.04.1"
},
{
"binary_name": "linux-intel-iotg-5.15-headers-5.15.0-1008",
"binary_version": "5.15.0-1008.11~20.04.1"
},
{
"binary_name": "linux-intel-iotg-5.15-tools-5.15.0-1008",
"binary_version": "5.15.0-1008.11~20.04.1"
},
{
"binary_name": "linux-intel-iotg-5.15-tools-common",
"binary_version": "5.15.0-1008.11~20.04.1"
},
{
"binary_name": "linux-intel-iotg-5.15-tools-host",
"binary_version": "5.15.0-1008.11~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-1008-intel-iotg",
"binary_version": "5.15.0-1008.11~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1008-intel-iotg",
"binary_version": "5.15.0-1008.11~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-1008-intel-iotg",
"binary_version": "5.15.0-1008.11~20.04.1"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1004-iot",
"binary_version": "5.4.0-1004.6"
},
{
"binary_name": "linux-headers-5.4.0-1004-iot",
"binary_version": "5.4.0-1004.6"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1004-iot",
"binary_version": "5.4.0-1004.6"
},
{
"binary_name": "linux-iot-headers-5.4.0-1004",
"binary_version": "5.4.0-1004.6"
},
{
"binary_name": "linux-iot-tools-5.4.0-1004",
"binary_version": "5.4.0-1004.6"
},
{
"binary_name": "linux-iot-tools-common",
"binary_version": "5.4.0-1004.6"
},
{
"binary_name": "linux-modules-5.4.0-1004-iot",
"binary_version": "5.4.0-1004.6"
},
{
"binary_name": "linux-tools-5.4.0-1004-iot",
"binary_version": "5.4.0-1004.6"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1071-kvm",
"binary_version": "5.4.0-1071.76"
},
{
"binary_name": "linux-headers-5.4.0-1071-kvm",
"binary_version": "5.4.0-1071.76"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1071-kvm",
"binary_version": "5.4.0-1071.76"
},
{
"binary_name": "linux-kvm-headers-5.4.0-1071",
"binary_version": "5.4.0-1071.76"
},
{
"binary_name": "linux-kvm-tools-5.4.0-1071",
"binary_version": "5.4.0-1071.76"
},
{
"binary_name": "linux-modules-5.4.0-1071-kvm",
"binary_version": "5.4.0-1071.76"
},
{
"binary_name": "linux-tools-5.4.0-1071-kvm",
"binary_version": "5.4.0-1071.76"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-42-lowlatency",
"binary_version": "5.15.0-42.45~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.15.0-42-lowlatency-64k",
"binary_version": "5.15.0-42.45~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.15.0-42-lowlatency",
"binary_version": "5.15.0-42.45~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-42-lowlatency",
"binary_version": "5.15.0-42.45~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-42-lowlatency-64k",
"binary_version": "5.15.0-42.45~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-42-lowlatency",
"binary_version": "5.15.0-42.45~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-42-lowlatency-64k",
"binary_version": "5.15.0-42.45~20.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-42",
"binary_version": "5.15.0-42.45~20.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-5.15-cloud-tools-common",
"binary_version": "5.15.0-42.45~20.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-5.15-headers-5.15.0-42",
"binary_version": "5.15.0-42.45~20.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-5.15-tools-5.15.0-42",
"binary_version": "5.15.0-42.45~20.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-5.15-tools-common",
"binary_version": "5.15.0-42.45~20.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-5.15-tools-host",
"binary_version": "5.15.0-42.45~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-42-lowlatency",
"binary_version": "5.15.0-42.45~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-42-lowlatency-64k",
"binary_version": "5.15.0-42.45~20.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-5.15.0-42-lowlatency",
"binary_version": "5.15.0-42.45~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-42-lowlatency",
"binary_version": "5.15.0-42.45~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-42-lowlatency-64k",
"binary_version": "5.15.0-42.45~20.04.1"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1079-oracle",
"binary_version": "5.4.0-1079.87"
},
{
"binary_name": "linux-headers-5.4.0-1079-oracle",
"binary_version": "5.4.0-1079.87"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1079-oracle",
"binary_version": "5.4.0-1079.87"
},
{
"binary_name": "linux-modules-5.4.0-1079-oracle",
"binary_version": "5.4.0-1079.87"
},
{
"binary_name": "linux-modules-extra-5.4.0-1079-oracle",
"binary_version": "5.4.0-1079.87"
},
{
"binary_name": "linux-oracle-headers-5.4.0-1079",
"binary_version": "5.4.0-1079.87"
},
{
"binary_name": "linux-oracle-tools-5.4.0-1079",
"binary_version": "5.4.0-1079.87"
},
{
"binary_name": "linux-tools-5.4.0-1079-oracle",
"binary_version": "5.4.0-1079.87"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1066-raspi",
"binary_version": "5.4.0-1066.76"
},
{
"binary_name": "linux-headers-5.4.0-1066-raspi",
"binary_version": "5.4.0-1066.76"
},
{
"binary_name": "linux-image-5.4.0-1066-raspi",
"binary_version": "5.4.0-1066.76"
},
{
"binary_name": "linux-modules-5.4.0-1066-raspi",
"binary_version": "5.4.0-1066.76"
},
{
"binary_name": "linux-raspi-headers-5.4.0-1066",
"binary_version": "5.4.0-1066.76"
},
{
"binary_name": "linux-raspi-tools-5.4.0-1066",
"binary_version": "5.4.0-1066.76"
},
{
"binary_name": "linux-tools-5.4.0-1066-raspi",
"binary_version": "5.4.0-1066.76"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-aws-5.11-cloud-tools-5.11.0-1028",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-aws-5.11-headers-5.11.0-1028",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-aws-5.11-tools-5.11.0-1028",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.11.0-1028-aws",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.11.0-1028-aws",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-headers-5.11.0-1028-aws",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.11.0-1028-aws",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-modules-5.11.0-1028-aws",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.11.0-1028-aws",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-tools-5.11.0-1028-aws",
"binary_version": "5.11.0-1028.31~20.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-aws-5.13-cloud-tools-5.13.0-1031",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-aws-5.13-headers-5.13.0-1031",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-aws-5.13-tools-5.13.0-1031",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.13.0-1031-aws",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.13.0-1031-aws",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-headers-5.13.0-1031-aws",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.13.0-1031-aws",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-modules-5.13.0-1031-aws",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.13.0-1031-aws",
"binary_version": "5.13.0-1031.35~20.04.1"
},
{
"binary_name": "linux-tools-5.13.0-1031-aws",
"binary_version": "5.13.0-1031.35~20.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-aws-5.8-cloud-tools-5.8.0-1042",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-aws-5.8-headers-5.8.0-1042",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-aws-5.8-tools-5.8.0-1042",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.8.0-1042-aws",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.8.0-1042-aws",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-headers-5.8.0-1042-aws",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-image-5.8.0-1042-aws",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-modules-5.8.0-1042-aws",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.8.0-1042-aws",
"binary_version": "5.8.0-1042.44~20.04.1"
},
{
"binary_name": "linux-tools-5.8.0-1042-aws",
"binary_version": "5.8.0-1042.44~20.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-azure-5.11-cloud-tools-5.11.0-1028",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-azure-5.11-headers-5.11.0-1028",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-azure-5.11-tools-5.11.0-1028",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-buildinfo-5.11.0-1028-azure",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-cloud-tools-5.11.0-1028-azure",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-headers-5.11.0-1028-azure",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-image-unsigned-5.11.0-1028-azure",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-modules-5.11.0-1028-azure",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-modules-extra-5.11.0-1028-azure",
"binary_version": "5.11.0-1028.31~20.04.2"
},
{
"binary_name": "linux-tools-5.11.0-1028-azure",
"binary_version": "5.11.0-1028.31~20.04.2"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-azure-5.13-cloud-tools-5.13.0-1031",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-azure-5.13-headers-5.13.0-1031",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-azure-5.13-tools-5.13.0-1031",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.13.0-1031-azure",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.13.0-1031-azure",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-headers-5.13.0-1031-azure",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.13.0-1031-azure",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-modules-5.13.0-1031-azure",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.13.0-1031-azure",
"binary_version": "5.13.0-1031.37~20.04.1"
},
{
"binary_name": "linux-tools-5.13.0-1031-azure",
"binary_version": "5.13.0-1031.37~20.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-azure-5.8-cloud-tools-5.8.0-1043",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-azure-5.8-headers-5.8.0-1043",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-azure-5.8-tools-5.8.0-1043",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.8.0-1043-azure",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.8.0-1043-azure",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-headers-5.8.0-1043-azure",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.8.0-1043-azure",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-modules-5.8.0-1043-azure",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.8.0-1043-azure",
"binary_version": "5.8.0-1043.46~20.04.1"
},
{
"binary_name": "linux-tools-5.8.0-1043-azure",
"binary_version": "5.8.0-1043.46~20.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-image-unsigned-5.4.0-1103-azure-fde",
"binary_version": "5.4.0-1103.109+cvm1.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.11.0-1029-gcp",
"binary_version": "5.11.0-1029.33~20.04.3"
},
{
"binary_name": "linux-gcp-5.11-headers-5.11.0-1029",
"binary_version": "5.11.0-1029.33~20.04.3"
},
{
"binary_name": "linux-gcp-5.11-tools-5.11.0-1029",
"binary_version": "5.11.0-1029.33~20.04.3"
},
{
"binary_name": "linux-headers-5.11.0-1029-gcp",
"binary_version": "5.11.0-1029.33~20.04.3"
},
{
"binary_name": "linux-image-unsigned-5.11.0-1029-gcp",
"binary_version": "5.11.0-1029.33~20.04.3"
},
{
"binary_name": "linux-modules-5.11.0-1029-gcp",
"binary_version": "5.11.0-1029.33~20.04.3"
},
{
"binary_name": "linux-modules-extra-5.11.0-1029-gcp",
"binary_version": "5.11.0-1029.33~20.04.3"
},
{
"binary_name": "linux-tools-5.11.0-1029-gcp",
"binary_version": "5.11.0-1029.33~20.04.3"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.13.0-1033-gcp",
"binary_version": "5.13.0-1033.40~20.04.1"
},
{
"binary_name": "linux-gcp-5.13-headers-5.13.0-1033",
"binary_version": "5.13.0-1033.40~20.04.1"
},
{
"binary_name": "linux-gcp-5.13-tools-5.13.0-1033",
"binary_version": "5.13.0-1033.40~20.04.1"
},
{
"binary_name": "linux-headers-5.13.0-1033-gcp",
"binary_version": "5.13.0-1033.40~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.13.0-1033-gcp",
"binary_version": "5.13.0-1033.40~20.04.1"
},
{
"binary_name": "linux-modules-5.13.0-1033-gcp",
"binary_version": "5.13.0-1033.40~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.13.0-1033-gcp",
"binary_version": "5.13.0-1033.40~20.04.1"
},
{
"binary_name": "linux-tools-5.13.0-1033-gcp",
"binary_version": "5.13.0-1033.40~20.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.8.0-1039-gcp",
"binary_version": "5.8.0-1039.41"
},
{
"binary_name": "linux-gcp-5.8-headers-5.8.0-1039",
"binary_version": "5.8.0-1039.41"
},
{
"binary_name": "linux-gcp-5.8-tools-5.8.0-1039",
"binary_version": "5.8.0-1039.41"
},
{
"binary_name": "linux-headers-5.8.0-1039-gcp",
"binary_version": "5.8.0-1039.41"
},
{
"binary_name": "linux-image-unsigned-5.8.0-1039-gcp",
"binary_version": "5.8.0-1039.41"
},
{
"binary_name": "linux-modules-5.8.0-1039-gcp",
"binary_version": "5.8.0-1039.41"
},
{
"binary_name": "linux-modules-extra-5.8.0-1039-gcp",
"binary_version": "5.8.0-1039.41"
},
{
"binary_name": "linux-tools-5.8.0-1039-gcp",
"binary_version": "5.8.0-1039.41"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1105-gke",
"binary_version": "5.4.0-1105.112"
},
{
"binary_name": "linux-gke-headers-5.4.0-1105",
"binary_version": "5.4.0-1105.112"
},
{
"binary_name": "linux-gke-tools-5.4.0-1105",
"binary_version": "5.4.0-1105.112"
},
{
"binary_name": "linux-headers-5.4.0-1105-gke",
"binary_version": "5.4.0-1105.112"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1105-gke",
"binary_version": "5.4.0-1105.112"
},
{
"binary_name": "linux-modules-5.4.0-1105-gke",
"binary_version": "5.4.0-1105.112"
},
{
"binary_name": "linux-modules-extra-5.4.0-1105-gke",
"binary_version": "5.4.0-1105.112"
},
{
"binary_name": "linux-tools-5.4.0-1105-gke",
"binary_version": "5.4.0-1105.112"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1039-gke",
"binary_version": "5.15.0-1039.44~20.04.1"
},
{
"binary_name": "linux-gke-5.15-headers-5.15.0-1039",
"binary_version": "5.15.0-1039.44~20.04.1"
},
{
"binary_name": "linux-gke-5.15-tools-5.15.0-1039",
"binary_version": "5.15.0-1039.44~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-1039-gke",
"binary_version": "5.15.0-1039.44~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1039-gke",
"binary_version": "5.15.0-1039.44~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-1039-gke",
"binary_version": "5.15.0-1039.44~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1039-gke",
"binary_version": "5.15.0-1039.44~20.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-5.15.0-1039-gke",
"binary_version": "5.15.0-1039.44~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-1039-gke",
"binary_version": "5.15.0-1039.44~20.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1102-gkeop",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1102-gkeop",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-gkeop-cloud-tools-5.4.0-1102",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-gkeop-headers-5.4.0-1102",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-gkeop-source-5.4.0",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-gkeop-tools-5.4.0-1102",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-headers-5.4.0-1102-gkeop",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1102-gkeop",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-modules-5.4.0-1102-gkeop",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-modules-extra-5.4.0-1102-gkeop",
"binary_version": "5.4.0-1102.106"
},
{
"binary_name": "linux-tools-5.4.0-1102-gkeop",
"binary_version": "5.4.0-1102.106"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1055-gkeop",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1055-gkeop",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-gkeop-5.15-cloud-tools-5.15.0-1055",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-gkeop-5.15-headers-5.15.0-1055",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-gkeop-5.15-tools-5.15.0-1055",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-headers-5.15.0-1055-gkeop",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1055-gkeop",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-modules-5.15.0-1055-gkeop",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.15.0-1055-gkeop",
"binary_version": "5.15.0-1055.62~20.04.1"
},
{
"binary_name": "linux-tools-5.15.0-1055-gkeop",
"binary_version": "5.15.0-1055.62~20.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "block-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "block-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "block-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "crypto-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "crypto-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "crypto-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "dasd-extra-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "dasd-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fat-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fat-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fat-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fb-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "firewire-core-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "floppy-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fs-core-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fs-core-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fs-core-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "input-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "input-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "input-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "ipmi-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "ipmi-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "ipmi-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "kernel-image-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "kernel-image-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "kernel-image-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.11.0-46-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.11.0-46-generic-64k",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.11.0-46-generic-lpae",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.11.0-46-lowlatency",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.11.0-46-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.11.0-46-lowlatency",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-headers-5.11.0-46-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-headers-5.11.0-46-generic-64k",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-headers-5.11.0-46-generic-lpae",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-headers-5.11.0-46-lowlatency",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-cloud-tools-5.11.0-46",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-cloud-tools-common",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-headers-5.11.0-46",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-source-5.11.0",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-tools-5.11.0-46",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-tools-common",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-tools-host",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-udebs-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-udebs-generic-64k",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-hwe-5.11-udebs-generic-lpae",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-image-5.11.0-46-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-image-5.11.0-46-generic-lpae",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.11.0-46-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.11.0-46-generic-64k",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.11.0-46-lowlatency",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-modules-5.11.0-46-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-modules-5.11.0-46-generic-64k",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-modules-5.11.0-46-generic-lpae",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-modules-5.11.0-46-lowlatency",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.11.0-46-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-tools-5.11.0-46-generic",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-tools-5.11.0-46-generic-64k",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-tools-5.11.0-46-generic-lpae",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "linux-tools-5.11.0-46-lowlatency",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "md-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "md-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "md-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "message-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "message-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "mouse-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "mouse-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "mouse-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "multipath-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "multipath-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "multipath-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nfs-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nfs-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nfs-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-pcmcia-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "parport-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "parport-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "parport-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "pata-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "pcmcia-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "pcmcia-storage-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "plip-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "plip-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "plip-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "ppp-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "ppp-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "ppp-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "sata-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "sata-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "sata-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "scsi-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "scsi-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "scsi-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "serial-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "storage-core-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "storage-core-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "storage-core-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "usb-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "usb-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "usb-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "virtio-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "virtio-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "vlan-modules-5.11.0-46-generic-64k-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "vlan-modules-5.11.0-46-generic-di",
"binary_version": "5.11.0-46.51~20.04.1"
},
{
"binary_name": "vlan-modules-5.11.0-46-generic-lpae-di",
"binary_version": "5.11.0-46.51~20.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "block-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "block-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "block-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "crypto-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "crypto-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "crypto-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "dasd-extra-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "dasd-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fat-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fat-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fat-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fb-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "firewire-core-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "floppy-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fs-core-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fs-core-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fs-core-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "input-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "input-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "input-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "ipmi-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "ipmi-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "ipmi-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "kernel-image-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "kernel-image-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "kernel-image-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.13.0-52-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.13.0-52-generic-64k",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.13.0-52-generic-lpae",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.13.0-52-lowlatency",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.13.0-52-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.13.0-52-lowlatency",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-headers-5.13.0-52-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-headers-5.13.0-52-generic-64k",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-headers-5.13.0-52-generic-lpae",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-headers-5.13.0-52-lowlatency",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-cloud-tools-5.13.0-52",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-cloud-tools-common",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-headers-5.13.0-52",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-source-5.13.0",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-tools-5.13.0-52",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-tools-common",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-tools-host",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-udebs-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-udebs-generic-64k",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-hwe-5.13-udebs-generic-lpae",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-image-5.13.0-52-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-image-5.13.0-52-generic-lpae",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.13.0-52-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.13.0-52-generic-64k",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.13.0-52-lowlatency",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-modules-5.13.0-52-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-modules-5.13.0-52-generic-64k",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-modules-5.13.0-52-generic-lpae",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-modules-5.13.0-52-lowlatency",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.13.0-52-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-tools-5.13.0-52-generic",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-tools-5.13.0-52-generic-64k",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-tools-5.13.0-52-generic-lpae",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "linux-tools-5.13.0-52-lowlatency",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "md-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "md-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "md-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "message-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "message-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "mouse-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "mouse-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "mouse-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "multipath-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "multipath-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "multipath-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nfs-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nfs-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nfs-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-pcmcia-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "parport-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "parport-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "parport-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "pata-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "pcmcia-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "pcmcia-storage-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "plip-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "plip-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "plip-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "ppp-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "ppp-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "ppp-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "sata-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "sata-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "sata-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "scsi-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "scsi-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "scsi-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "serial-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "storage-core-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "storage-core-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "storage-core-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "usb-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "usb-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "usb-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "virtio-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "virtio-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "vlan-modules-5.13.0-52-generic-64k-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "vlan-modules-5.13.0-52-generic-di",
"binary_version": "5.13.0-52.59~20.04.1"
},
{
"binary_name": "vlan-modules-5.13.0-52-generic-lpae-di",
"binary_version": "5.13.0-52.59~20.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "block-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "block-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "block-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "crypto-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "crypto-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "crypto-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "dasd-extra-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "dasd-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fat-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fat-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fat-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fb-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "firewire-core-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "floppy-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fs-core-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fs-core-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fs-core-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "input-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "input-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "input-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "ipmi-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "ipmi-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "ipmi-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "kernel-image-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "kernel-image-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "kernel-image-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.8.0-63-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.8.0-63-generic-64k",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.8.0-63-generic-lpae",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.8.0-63-lowlatency",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.8.0-63-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-cloud-tools-5.8.0-63-lowlatency",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-headers-5.8.0-63-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-headers-5.8.0-63-generic-64k",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-headers-5.8.0-63-generic-lpae",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-headers-5.8.0-63-lowlatency",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-cloud-tools-5.8.0-63",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-cloud-tools-common",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-headers-5.8.0-63",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-source-5.8.0",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-tools-5.8.0-63",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-tools-common",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-tools-host",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-udebs-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-udebs-generic-64k",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-hwe-5.8-udebs-generic-lpae",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-image-5.8.0-63-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-image-5.8.0-63-generic-lpae",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.8.0-63-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.8.0-63-generic-64k",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.8.0-63-lowlatency",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-modules-5.8.0-63-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-modules-5.8.0-63-generic-64k",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-modules-5.8.0-63-generic-lpae",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-modules-5.8.0-63-lowlatency",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.8.0-63-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-tools-5.8.0-63-generic",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-tools-5.8.0-63-generic-64k",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-tools-5.8.0-63-generic-lpae",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "linux-tools-5.8.0-63-lowlatency",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "md-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "md-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "md-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "message-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "message-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "mouse-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "mouse-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "mouse-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "multipath-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "multipath-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "multipath-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nfs-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nfs-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nfs-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-pcmcia-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "parport-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "parport-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "parport-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "pata-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "pcmcia-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "pcmcia-storage-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "plip-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "plip-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "plip-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "ppp-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "ppp-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "ppp-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "sata-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "sata-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "sata-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "scsi-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "scsi-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "scsi-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "serial-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "storage-core-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "storage-core-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "storage-core-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "usb-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "usb-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "usb-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "virtio-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "virtio-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "vlan-modules-5.8.0-63-generic-64k-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "vlan-modules-5.8.0-63-generic-di",
"binary_version": "5.8.0-63.71~20.04.1"
},
{
"binary_name": "vlan-modules-5.8.0-63-generic-lpae-di",
"binary_version": "5.8.0-63.71~20.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.13.0-1017-intel",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-cloud-tools-5.13.0-1017-intel",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-headers-5.13.0-1017-intel",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-image-unsigned-5.13.0-1017-intel",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-intel-5.13-cloud-tools-5.13.0-1017",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-intel-5.13-cloud-tools-common",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-intel-5.13-headers-5.13.0-1017",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-intel-5.13-source-5.13.0",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-intel-5.13-tools-5.13.0-1017",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-intel-5.13-tools-common",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-intel-5.13-tools-host",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-modules-5.13.0-1017-intel",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-modules-extra-5.13.0-1017-intel",
"binary_version": "5.13.0-1017.19"
},
{
"binary_name": "linux-tools-5.13.0-1017-intel",
"binary_version": "5.13.0-1017.19"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.10.0-1057-oem",
"binary_version": "5.10.0-1057.61"
},
{
"binary_name": "linux-headers-5.10.0-1057-oem",
"binary_version": "5.10.0-1057.61"
},
{
"binary_name": "linux-image-unsigned-5.10.0-1057-oem",
"binary_version": "5.10.0-1057.61"
},
{
"binary_name": "linux-modules-5.10.0-1057-oem",
"binary_version": "5.10.0-1057.61"
},
{
"binary_name": "linux-oem-5.10-headers-5.10.0-1057",
"binary_version": "5.10.0-1057.61"
},
{
"binary_name": "linux-oem-5.10-tools-5.10.0-1057",
"binary_version": "5.10.0-1057.61"
},
{
"binary_name": "linux-oem-5.10-tools-host",
"binary_version": "5.10.0-1057.61"
},
{
"binary_name": "linux-tools-5.10.0-1057-oem",
"binary_version": "5.10.0-1057.61"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.13.0-1029-oem",
"binary_version": "5.13.0-1029.36"
},
{
"binary_name": "linux-headers-5.13.0-1029-oem",
"binary_version": "5.13.0-1029.36"
},
{
"binary_name": "linux-image-unsigned-5.13.0-1029-oem",
"binary_version": "5.13.0-1029.36"
},
{
"binary_name": "linux-modules-5.13.0-1029-oem",
"binary_version": "5.13.0-1029.36"
},
{
"binary_name": "linux-oem-5.13-headers-5.13.0-1029",
"binary_version": "5.13.0-1029.36"
},
{
"binary_name": "linux-oem-5.13-tools-5.13.0-1029",
"binary_version": "5.13.0-1029.36"
},
{
"binary_name": "linux-oem-5.13-tools-host",
"binary_version": "5.13.0-1029.36"
},
{
"binary_name": "linux-tools-5.13.0-1029-oem",
"binary_version": "5.13.0-1029.36"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.14.0-1059-oem",
"binary_version": "5.14.0-1059.67"
},
{
"binary_name": "linux-headers-5.14.0-1059-oem",
"binary_version": "5.14.0-1059.67"
},
{
"binary_name": "linux-image-unsigned-5.14.0-1059-oem",
"binary_version": "5.14.0-1059.67"
},
{
"binary_name": "linux-modules-5.14.0-1059-oem",
"binary_version": "5.14.0-1059.67"
},
{
"binary_name": "linux-modules-iwlwifi-5.14.0-1059-oem",
"binary_version": "5.14.0-1059.67"
},
{
"binary_name": "linux-oem-5.14-headers-5.14.0-1059",
"binary_version": "5.14.0-1059.67"
},
{
"binary_name": "linux-oem-5.14-tools-5.14.0-1059",
"binary_version": "5.14.0-1059.67"
},
{
"binary_name": "linux-oem-5.14-tools-host",
"binary_version": "5.14.0-1059.67"
},
{
"binary_name": "linux-tools-5.14.0-1059-oem",
"binary_version": "5.14.0-1059.67"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.6.0-1056-oem",
"binary_version": "5.6.0-1056.60"
},
{
"binary_name": "linux-headers-5.6.0-1056-oem",
"binary_version": "5.6.0-1056.60"
},
{
"binary_name": "linux-image-unsigned-5.6.0-1056-oem",
"binary_version": "5.6.0-1056.60"
},
{
"binary_name": "linux-modules-5.6.0-1056-oem",
"binary_version": "5.6.0-1056.60"
},
{
"binary_name": "linux-oem-5.6-headers-5.6.0-1056",
"binary_version": "5.6.0-1056.60"
},
{
"binary_name": "linux-oem-5.6-tools-5.6.0-1056",
"binary_version": "5.6.0-1056.60"
},
{
"binary_name": "linux-oem-5.6-tools-host",
"binary_version": "5.6.0-1056.60"
},
{
"binary_name": "linux-tools-5.6.0-1056-oem",
"binary_version": "5.6.0-1056.60"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.11.0-1028-oracle",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-headers-5.11.0-1028-oracle",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.11.0-1028-oracle",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-modules-5.11.0-1028-oracle",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.11.0-1028-oracle",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-oracle-5.11-headers-5.11.0-1028",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-oracle-5.11-tools-5.11.0-1028",
"binary_version": "5.11.0-1028.31~20.04.1"
},
{
"binary_name": "linux-tools-5.11.0-1028-oracle",
"binary_version": "5.11.0-1028.31~20.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.13.0-1036-oracle",
"binary_version": "5.13.0-1036.43~20.04.1"
},
{
"binary_name": "linux-headers-5.13.0-1036-oracle",
"binary_version": "5.13.0-1036.43~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.13.0-1036-oracle",
"binary_version": "5.13.0-1036.43~20.04.1"
},
{
"binary_name": "linux-modules-5.13.0-1036-oracle",
"binary_version": "5.13.0-1036.43~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.13.0-1036-oracle",
"binary_version": "5.13.0-1036.43~20.04.1"
},
{
"binary_name": "linux-oracle-5.13-headers-5.13.0-1036",
"binary_version": "5.13.0-1036.43~20.04.1"
},
{
"binary_name": "linux-oracle-5.13-tools-5.13.0-1036",
"binary_version": "5.13.0-1036.43~20.04.1"
},
{
"binary_name": "linux-tools-5.13.0-1036-oracle",
"binary_version": "5.13.0-1036.43~20.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.8.0-1038-oracle",
"binary_version": "5.8.0-1038.39~20.04.1"
},
{
"binary_name": "linux-headers-5.8.0-1038-oracle",
"binary_version": "5.8.0-1038.39~20.04.1"
},
{
"binary_name": "linux-image-unsigned-5.8.0-1038-oracle",
"binary_version": "5.8.0-1038.39~20.04.1"
},
{
"binary_name": "linux-modules-5.8.0-1038-oracle",
"binary_version": "5.8.0-1038.39~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.8.0-1038-oracle",
"binary_version": "5.8.0-1038.39~20.04.1"
},
{
"binary_name": "linux-oracle-5.8-headers-5.8.0-1038",
"binary_version": "5.8.0-1038.39~20.04.1"
},
{
"binary_name": "linux-oracle-5.8-tools-5.8.0-1038",
"binary_version": "5.8.0-1038.39~20.04.1"
},
{
"binary_name": "linux-tools-5.8.0-1038-oracle",
"binary_version": "5.8.0-1038.39~20.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1006-raspi2",
"binary_version": "5.4.0-1006.6"
},
{
"binary_name": "linux-headers-5.4.0-1006-raspi2",
"binary_version": "5.4.0-1006.6"
},
{
"binary_name": "linux-image-5.4.0-1006-raspi2",
"binary_version": "5.4.0-1006.6"
},
{
"binary_name": "linux-modules-5.4.0-1006-raspi2",
"binary_version": "5.4.0-1006.6"
},
{
"binary_name": "linux-raspi2-headers-5.4.0-1006",
"binary_version": "5.4.0-1006.6"
},
{
"binary_name": "linux-raspi2-tools-5.4.0-1006",
"binary_version": "5.4.0-1006.6"
},
{
"binary_name": "linux-tools-5.4.0-1006-raspi2",
"binary_version": "5.4.0-1006.6"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "block-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "crypto-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "fat-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "firewire-core-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "fs-core-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "fs-secondary-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "input-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "ipmi-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "kernel-image-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-buildinfo-5.4.0-40-generic",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-headers-5.4.0-40-generic",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-image-5.4.0-40-generic",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-modules-5.4.0-40-generic",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-modules-extra-5.4.0-40-generic",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-riscv-headers-5.4.0-40",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-riscv-tools-5.4.0-40",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-tools-5.4.0-40-generic",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "linux-udebs-generic",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "md-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "message-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "mouse-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "multipath-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "nfs-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "nic-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "nic-shared-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "nic-usb-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "parport-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "pata-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "plip-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "ppp-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "sata-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "scsi-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "storage-core-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "usb-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "virtio-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
},
{
"binary_name": "vlan-modules-5.4.0-40-generic-di",
"binary_version": "5.4.0-40.45"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.11.0-1031-generic",
"binary_version": "5.11.0-1031.35"
},
{
"binary_name": "linux-headers-5.11.0-1031-generic",
"binary_version": "5.11.0-1031.35"
},
{
"binary_name": "linux-image-5.11.0-1031-generic",
"binary_version": "5.11.0-1031.35"
},
{
"binary_name": "linux-modules-5.11.0-1031-generic",
"binary_version": "5.11.0-1031.35"
},
{
"binary_name": "linux-modules-extra-5.11.0-1031-generic",
"binary_version": "5.11.0-1031.35"
},
{
"binary_name": "linux-riscv-5.11-headers-5.11.0-1031",
"binary_version": "5.11.0-1031.35"
},
{
"binary_name": "linux-riscv-5.11-tools-5.11.0-1031",
"binary_version": "5.11.0-1031.35"
},
{
"binary_name": "linux-tools-5.11.0-1031-generic",
"binary_version": "5.11.0-1031.35"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "block-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "crypto-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "fat-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "firewire-core-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "fs-core-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "fs-secondary-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "input-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "ipmi-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "kernel-image-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-buildinfo-5.8.0-29-generic",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-headers-5.8.0-29-generic",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-image-5.8.0-29-generic",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-modules-5.8.0-29-generic",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-modules-extra-5.8.0-29-generic",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-riscv-5.8-headers-5.8.0-29",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-riscv-5.8-tools-5.8.0-29",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-tools-5.8.0-29-generic",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "linux-udebs-generic",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "md-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "message-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "mouse-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "multipath-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "nfs-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "nic-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "nic-shared-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "nic-usb-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "parport-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "pata-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "plip-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "ppp-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "sata-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "scsi-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "storage-core-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "usb-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "virtio-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
},
{
"binary_name": "vlan-modules-5.8.0-29-generic-di",
"binary_version": "5.8.0-29.31~20.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-37-generic",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-buildinfo-5.15.0-37-generic-64k",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-buildinfo-5.15.0-37-generic-lpae",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-cloud-tools-5.15.0-37",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-cloud-tools-5.15.0-37-generic",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-cloud-tools-common",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-headers-5.15.0-37",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-headers-5.15.0-37-generic",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-headers-5.15.0-37-generic-64k",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-headers-5.15.0-37-generic-lpae",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-image-5.15.0-37-generic",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-image-5.15.0-37-generic-lpae",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-image-unsigned-5.15.0-37-generic",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-image-unsigned-5.15.0-37-generic-64k",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-libc-dev",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-modules-5.15.0-37-generic",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-modules-5.15.0-37-generic-64k",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-modules-5.15.0-37-generic-lpae",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-modules-extra-5.15.0-37-generic",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-source-5.15.0",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-tools-5.15.0-37",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-tools-5.15.0-37-generic",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-tools-5.15.0-37-generic-64k",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-tools-5.15.0-37-generic-lpae",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-tools-common",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-tools-host",
"binary_version": "5.15.0-37.39"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-allwinner-5.19-headers-5.19.0-1015",
"binary_version": "5.19.0-1015.15~22.04.1"
},
{
"binary_name": "linux-allwinner-5.19-tools-5.19.0-1015",
"binary_version": "5.19.0-1015.15~22.04.1"
},
{
"binary_name": "linux-buildinfo-5.19.0-1015-allwinner",
"binary_version": "5.19.0-1015.15~22.04.1"
},
{
"binary_name": "linux-headers-5.19.0-1015-allwinner",
"binary_version": "5.19.0-1015.15~22.04.1"
},
{
"binary_name": "linux-image-5.19.0-1015-allwinner",
"binary_version": "5.19.0-1015.15~22.04.1"
},
{
"binary_name": "linux-modules-5.19.0-1015-allwinner",
"binary_version": "5.19.0-1015.15~22.04.1"
},
{
"binary_name": "linux-modules-extra-5.19.0-1015-allwinner",
"binary_version": "5.19.0-1015.15~22.04.1"
},
{
"binary_name": "linux-tools-5.19.0-1015-allwinner",
"binary_version": "5.19.0-1015.15~22.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-aws-cloud-tools-5.15.0-1011",
"binary_version": "5.15.0-1011.14"
},
{
"binary_name": "linux-aws-headers-5.15.0-1011",
"binary_version": "5.15.0-1011.14"
},
{
"binary_name": "linux-aws-tools-5.15.0-1011",
"binary_version": "5.15.0-1011.14"
},
{
"binary_name": "linux-buildinfo-5.15.0-1011-aws",
"binary_version": "5.15.0-1011.14"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1011-aws",
"binary_version": "5.15.0-1011.14"
},
{
"binary_name": "linux-headers-5.15.0-1011-aws",
"binary_version": "5.15.0-1011.14"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1011-aws",
"binary_version": "5.15.0-1011.14"
},
{
"binary_name": "linux-modules-5.15.0-1011-aws",
"binary_version": "5.15.0-1011.14"
},
{
"binary_name": "linux-modules-extra-5.15.0-1011-aws",
"binary_version": "5.15.0-1011.14"
},
{
"binary_name": "linux-tools-5.15.0-1011-aws",
"binary_version": "5.15.0-1011.14"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-aws-5.19-cloud-tools-5.19.0-1029",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-aws-5.19-headers-5.19.0-1029",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-aws-5.19-tools-5.19.0-1029",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-buildinfo-5.19.0-1029-aws",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-cloud-tools-5.19.0-1029-aws",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-headers-5.19.0-1029-aws",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-image-unsigned-5.19.0-1029-aws",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-modules-5.19.0-1029-aws",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-modules-extra-5.19.0-1029-aws",
"binary_version": "5.19.0-1029.30~22.04.1"
},
{
"binary_name": "linux-tools-5.19.0-1029-aws",
"binary_version": "5.19.0-1029.30~22.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-aws-6.2-cloud-tools-6.2.0-1018",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-aws-6.2-headers-6.2.0-1018",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-aws-6.2-tools-6.2.0-1018",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.2.0-1018-aws",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.2.0-1018-aws",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-1018-aws",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.2.0-1018-aws",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-1018-aws",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.2.0-1018-aws",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-1018-aws",
"binary_version": "6.2.0-1018.18~22.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-aws-6.5-cloud-tools-6.5.0-1024",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-aws-6.5-headers-6.5.0-1024",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-aws-6.5-tools-6.5.0-1024",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.5.0-1024-aws",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.5.0-1024-aws",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-1024-aws",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-1024-aws",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-1024-aws",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.5.0-1024-aws",
"binary_version": "6.5.0-1024.24~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-1024-aws",
"binary_version": "6.5.0-1024.24~22.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-azure-cloud-tools-5.15.0-1010",
"binary_version": "5.15.0-1010.12"
},
{
"binary_name": "linux-azure-headers-5.15.0-1010",
"binary_version": "5.15.0-1010.12"
},
{
"binary_name": "linux-azure-tools-5.15.0-1010",
"binary_version": "5.15.0-1010.12"
},
{
"binary_name": "linux-buildinfo-5.15.0-1010-azure",
"binary_version": "5.15.0-1010.12"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1010-azure",
"binary_version": "5.15.0-1010.12"
},
{
"binary_name": "linux-headers-5.15.0-1010-azure",
"binary_version": "5.15.0-1010.12"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1010-azure",
"binary_version": "5.15.0-1010.12"
},
{
"binary_name": "linux-modules-5.15.0-1010-azure",
"binary_version": "5.15.0-1010.12"
},
{
"binary_name": "linux-modules-extra-5.15.0-1010-azure",
"binary_version": "5.15.0-1010.12"
},
{
"binary_name": "linux-tools-5.15.0-1010-azure",
"binary_version": "5.15.0-1010.12"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-azure-5.19-cloud-tools-5.19.0-1027",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-azure-5.19-headers-5.19.0-1027",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-azure-5.19-tools-5.19.0-1027",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-buildinfo-5.19.0-1027-azure",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-cloud-tools-5.19.0-1027-azure",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-headers-5.19.0-1027-azure",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-image-unsigned-5.19.0-1027-azure",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-modules-5.19.0-1027-azure",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-modules-extra-5.19.0-1027-azure",
"binary_version": "5.19.0-1027.30~22.04.2"
},
{
"binary_name": "linux-tools-5.19.0-1027-azure",
"binary_version": "5.19.0-1027.30~22.04.2"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-azure-6.2-cloud-tools-6.2.0-1019",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-azure-6.2-headers-6.2.0-1019",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-azure-6.2-tools-6.2.0-1019",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.2.0-1019-azure",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.2.0-1019-azure",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-1019-azure",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.2.0-1019-azure",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-1019-azure",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.2.0-1019-azure",
"binary_version": "6.2.0-1019.19~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-1019-azure",
"binary_version": "6.2.0-1019.19~22.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-azure-6.5-cloud-tools-6.5.0-1025",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-azure-6.5-headers-6.5.0-1025",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-azure-6.5-tools-6.5.0-1025",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.5.0-1025-azure",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.5.0-1025-azure",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-1025-azure",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-1025-azure",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-1025-azure",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.5.0-1025-azure",
"binary_version": "6.5.0-1025.26~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-1025-azure",
"binary_version": "6.5.0-1025.26~22.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-image-unsigned-5.19.0-1027-azure-fde",
"binary_version": "5.19.0-1027.30~22.04.2.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-image-unsigned-6.2.0-1019-azure-fde",
"binary_version": "6.2.0-1019.19~22.04.1.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1008-gcp",
"binary_version": "5.15.0-1008.12"
},
{
"binary_name": "linux-gcp-headers-5.15.0-1008",
"binary_version": "5.15.0-1008.12"
},
{
"binary_name": "linux-gcp-tools-5.15.0-1008",
"binary_version": "5.15.0-1008.12"
},
{
"binary_name": "linux-headers-5.15.0-1008-gcp",
"binary_version": "5.15.0-1008.12"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1008-gcp",
"binary_version": "5.15.0-1008.12"
},
{
"binary_name": "linux-modules-5.15.0-1008-gcp",
"binary_version": "5.15.0-1008.12"
},
{
"binary_name": "linux-modules-extra-5.15.0-1008-gcp",
"binary_version": "5.15.0-1008.12"
},
{
"binary_name": "linux-tools-5.15.0-1008-gcp",
"binary_version": "5.15.0-1008.12"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.19.0-1030-gcp",
"binary_version": "5.19.0-1030.32~22.04.1"
},
{
"binary_name": "linux-gcp-5.19-headers-5.19.0-1030",
"binary_version": "5.19.0-1030.32~22.04.1"
},
{
"binary_name": "linux-gcp-5.19-tools-5.19.0-1030",
"binary_version": "5.19.0-1030.32~22.04.1"
},
{
"binary_name": "linux-headers-5.19.0-1030-gcp",
"binary_version": "5.19.0-1030.32~22.04.1"
},
{
"binary_name": "linux-image-unsigned-5.19.0-1030-gcp",
"binary_version": "5.19.0-1030.32~22.04.1"
},
{
"binary_name": "linux-modules-5.19.0-1030-gcp",
"binary_version": "5.19.0-1030.32~22.04.1"
},
{
"binary_name": "linux-modules-extra-5.19.0-1030-gcp",
"binary_version": "5.19.0-1030.32~22.04.1"
},
{
"binary_name": "linux-tools-5.19.0-1030-gcp",
"binary_version": "5.19.0-1030.32~22.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.2.0-1021-gcp",
"binary_version": "6.2.0-1021.23~22.04.1"
},
{
"binary_name": "linux-gcp-6.2-headers-6.2.0-1021",
"binary_version": "6.2.0-1021.23~22.04.1"
},
{
"binary_name": "linux-gcp-6.2-tools-6.2.0-1021",
"binary_version": "6.2.0-1021.23~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-1021-gcp",
"binary_version": "6.2.0-1021.23~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.2.0-1021-gcp",
"binary_version": "6.2.0-1021.23~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-1021-gcp",
"binary_version": "6.2.0-1021.23~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.2.0-1021-gcp",
"binary_version": "6.2.0-1021.23~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-1021-gcp",
"binary_version": "6.2.0-1021.23~22.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.5.0-1025-gcp",
"binary_version": "6.5.0-1025.27~22.04.1"
},
{
"binary_name": "linux-gcp-6.5-headers-6.5.0-1025",
"binary_version": "6.5.0-1025.27~22.04.1"
},
{
"binary_name": "linux-gcp-6.5-tools-6.5.0-1025",
"binary_version": "6.5.0-1025.27~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-1025-gcp",
"binary_version": "6.5.0-1025.27~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-1025-gcp",
"binary_version": "6.5.0-1025.27~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-1025-gcp",
"binary_version": "6.5.0-1025.27~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.5.0-1025-gcp",
"binary_version": "6.5.0-1025.27~22.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.5.0-1025-gcp",
"binary_version": "6.5.0-1025.27~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-1025-gcp",
"binary_version": "6.5.0-1025.27~22.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1008-gke",
"binary_version": "5.15.0-1008.10"
},
{
"binary_name": "linux-gke-headers-5.15.0-1008",
"binary_version": "5.15.0-1008.10"
},
{
"binary_name": "linux-gke-tools-5.15.0-1008",
"binary_version": "5.15.0-1008.10"
},
{
"binary_name": "linux-headers-5.15.0-1008-gke",
"binary_version": "5.15.0-1008.10"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1008-gke",
"binary_version": "5.15.0-1008.10"
},
{
"binary_name": "linux-modules-5.15.0-1008-gke",
"binary_version": "5.15.0-1008.10"
},
{
"binary_name": "linux-modules-extra-5.15.0-1008-gke",
"binary_version": "5.15.0-1008.10"
},
{
"binary_name": "linux-tools-5.15.0-1008-gke",
"binary_version": "5.15.0-1008.10"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-buildinfo-5.19.0-50-generic-64k",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-buildinfo-5.19.0-50-generic-lpae",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-cloud-tools-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-headers-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-headers-5.19.0-50-generic-64k",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-headers-5.19.0-50-generic-lpae",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-hwe-5.19-cloud-tools-5.19.0-50",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-hwe-5.19-cloud-tools-common",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-hwe-5.19-headers-5.19.0-50",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-hwe-5.19-tools-5.19.0-50",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-hwe-5.19-tools-common",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-hwe-5.19-tools-host",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-image-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-image-5.19.0-50-generic-lpae",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-image-unsigned-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-image-unsigned-5.19.0-50-generic-64k",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-modules-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-modules-5.19.0-50-generic-64k",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-modules-5.19.0-50-generic-lpae",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-modules-extra-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-modules-ipu6-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-modules-ivsc-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-modules-iwlwifi-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-source-5.19.0",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-tools-5.19.0-50-generic",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-tools-5.19.0-50-generic-64k",
"binary_version": "5.19.0-50.50"
},
{
"binary_name": "linux-tools-5.19.0-50-generic-lpae",
"binary_version": "5.19.0-50.50"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.2.0-39-generic-64k",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.2.0-39-generic-lpae",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-39-generic-64k",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-39-generic-lpae",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-hwe-6.2-cloud-tools-6.2.0-39",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-hwe-6.2-cloud-tools-common",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-hwe-6.2-headers-6.2.0-39",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-hwe-6.2-tools-6.2.0-39",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-hwe-6.2-tools-common",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-hwe-6.2-tools-host",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-image-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-image-6.2.0-39-generic-lpae",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.2.0-39-generic-64k",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-39-generic-64k",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-39-generic-lpae",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-modules-ipu6-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-modules-ivsc-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-source-6.2.0",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-39-generic",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-39-generic-64k",
"binary_version": "6.2.0-39.40~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-39-generic-lpae",
"binary_version": "6.2.0-39.40~22.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.5.0-45-generic-64k",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-45-generic-64k",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-hwe-6.5-cloud-tools-6.5.0-45",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-hwe-6.5-cloud-tools-common",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-hwe-6.5-headers-6.5.0-45",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-hwe-6.5-tools-6.5.0-45",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-hwe-6.5-tools-common",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-hwe-6.5-tools-host",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-image-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-45-generic-64k",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-45-generic-64k",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-modules-ipu6-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-modules-ivsc-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-source-6.5.0",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-45-generic",
"binary_version": "6.5.0-45.45~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-45-generic-64k",
"binary_version": "6.5.0-45.45~22.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1007-ibm",
"binary_version": "5.15.0-1007.8"
},
{
"binary_name": "linux-headers-5.15.0-1007-ibm",
"binary_version": "5.15.0-1007.8"
},
{
"binary_name": "linux-ibm-cloud-tools-common",
"binary_version": "5.15.0-1007.8"
},
{
"binary_name": "linux-ibm-headers-5.15.0-1007",
"binary_version": "5.15.0-1007.8"
},
{
"binary_name": "linux-ibm-source-5.15.0",
"binary_version": "5.15.0-1007.8"
},
{
"binary_name": "linux-ibm-tools-5.15.0-1007",
"binary_version": "5.15.0-1007.8"
},
{
"binary_name": "linux-ibm-tools-common",
"binary_version": "5.15.0-1007.8"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1007-ibm",
"binary_version": "5.15.0-1007.8"
},
{
"binary_name": "linux-modules-5.15.0-1007-ibm",
"binary_version": "5.15.0-1007.8"
},
{
"binary_name": "linux-modules-extra-5.15.0-1007-ibm",
"binary_version": "5.15.0-1007.8"
},
{
"binary_name": "linux-tools-5.15.0-1007-ibm",
"binary_version": "5.15.0-1007.8"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1073-intel-iot-realtime",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1073-intel-iot-realtime",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-headers-5.15.0-1073-intel-iot-realtime",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1073-intel-iot-realtime",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-intel-iot-realtime-cloud-tools-5.15.0-1073",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-intel-iot-realtime-cloud-tools-common",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-intel-iot-realtime-headers-5.15.0-1073",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-intel-iot-realtime-tools-5.15.0-1073",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-intel-iot-realtime-tools-common",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-intel-iot-realtime-tools-host",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-modules-5.15.0-1073-intel-iot-realtime",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-modules-extra-5.15.0-1073-intel-iot-realtime",
"binary_version": "5.15.0-1073.75"
},
{
"binary_name": "linux-tools-5.15.0-1073-intel-iot-realtime",
"binary_version": "5.15.0-1073.75"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1008-intel-iotg",
"binary_version": "5.15.0-1008.11"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1008-intel-iotg",
"binary_version": "5.15.0-1008.11"
},
{
"binary_name": "linux-headers-5.15.0-1008-intel-iotg",
"binary_version": "5.15.0-1008.11"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1008-intel-iotg",
"binary_version": "5.15.0-1008.11"
},
{
"binary_name": "linux-intel-iotg-cloud-tools-5.15.0-1008",
"binary_version": "5.15.0-1008.11"
},
{
"binary_name": "linux-intel-iotg-cloud-tools-common",
"binary_version": "5.15.0-1008.11"
},
{
"binary_name": "linux-intel-iotg-headers-5.15.0-1008",
"binary_version": "5.15.0-1008.11"
},
{
"binary_name": "linux-intel-iotg-tools-5.15.0-1008",
"binary_version": "5.15.0-1008.11"
},
{
"binary_name": "linux-intel-iotg-tools-common",
"binary_version": "5.15.0-1008.11"
},
{
"binary_name": "linux-intel-iotg-tools-host",
"binary_version": "5.15.0-1008.11"
},
{
"binary_name": "linux-modules-5.15.0-1008-intel-iotg",
"binary_version": "5.15.0-1008.11"
},
{
"binary_name": "linux-modules-extra-5.15.0-1008-intel-iotg",
"binary_version": "5.15.0-1008.11"
},
{
"binary_name": "linux-tools-5.15.0-1008-intel-iotg",
"binary_version": "5.15.0-1008.11"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1010-kvm",
"binary_version": "5.15.0-1010.11"
},
{
"binary_name": "linux-headers-5.15.0-1010-kvm",
"binary_version": "5.15.0-1010.11"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1010-kvm",
"binary_version": "5.15.0-1010.11"
},
{
"binary_name": "linux-kvm-headers-5.15.0-1010",
"binary_version": "5.15.0-1010.11"
},
{
"binary_name": "linux-kvm-tools-5.15.0-1010",
"binary_version": "5.15.0-1010.11"
},
{
"binary_name": "linux-modules-5.15.0-1010-kvm",
"binary_version": "5.15.0-1010.11"
},
{
"binary_name": "linux-tools-5.15.0-1010-kvm",
"binary_version": "5.15.0-1010.11"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-37-lowlatency",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-buildinfo-5.15.0-37-lowlatency-64k",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-cloud-tools-5.15.0-37-lowlatency",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-headers-5.15.0-37-lowlatency",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-headers-5.15.0-37-lowlatency-64k",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-image-unsigned-5.15.0-37-lowlatency",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-image-unsigned-5.15.0-37-lowlatency-64k",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-lowlatency-cloud-tools-5.15.0-37",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-lowlatency-cloud-tools-common",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-lowlatency-headers-5.15.0-37",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-lowlatency-tools-5.15.0-37",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-lowlatency-tools-common",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-lowlatency-tools-host",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-modules-5.15.0-37-lowlatency",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-modules-5.15.0-37-lowlatency-64k",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-tools-5.15.0-37-lowlatency",
"binary_version": "5.15.0-37.39"
},
{
"binary_name": "linux-tools-5.15.0-37-lowlatency-64k",
"binary_version": "5.15.0-37.39"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-buildinfo-5.19.0-1030-lowlatency-64k",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-cloud-tools-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-headers-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-headers-5.19.0-1030-lowlatency-64k",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-image-unsigned-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-image-unsigned-5.19.0-1030-lowlatency-64k",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-lowlatency-hwe-5.19-cloud-tools-5.19.0-1030",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-lowlatency-hwe-5.19-cloud-tools-common",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-lowlatency-hwe-5.19-headers-5.19.0-1030",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-lowlatency-hwe-5.19-tools-5.19.0-1030",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-lowlatency-hwe-5.19-tools-common",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-lowlatency-hwe-5.19-tools-host",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-modules-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-modules-5.19.0-1030-lowlatency-64k",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-modules-ipu6-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-modules-ivsc-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-modules-iwlwifi-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-tools-5.19.0-1030-lowlatency",
"binary_version": "5.19.0-1030.30"
},
{
"binary_name": "linux-tools-5.19.0-1030-lowlatency-64k",
"binary_version": "5.19.0-1030.30"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.2.0-1018-lowlatency-64k",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-1018-lowlatency-64k",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.2.0-1018-lowlatency-64k",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.2-cloud-tools-6.2.0-1018",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.2-cloud-tools-common",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.2-headers-6.2.0-1018",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.2-tools-6.2.0-1018",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.2-tools-common",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.2-tools-host",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-1018-lowlatency-64k",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-modules-ipu6-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-modules-ivsc-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-1018-lowlatency",
"binary_version": "6.2.0-1018.18~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-1018-lowlatency-64k",
"binary_version": "6.2.0-1018.18~22.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.5.0-45-lowlatency",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.5.0-45-lowlatency-64k",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-cloud-tools-6.5.0-45-lowlatency",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-45-lowlatency",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-45-lowlatency-64k",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-45-lowlatency",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-45-lowlatency-64k",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.5-cloud-tools-6.5.0-45",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.5-cloud-tools-common",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.5-headers-6.5.0-45",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.5-lib-rust-6.5.0-45-lowlatency",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.5-tools-6.5.0-45",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.5-tools-common",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-lowlatency-hwe-6.5-tools-host",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-45-lowlatency",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-45-lowlatency-64k",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-modules-iwlwifi-6.5.0-45-lowlatency",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-45-lowlatency",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-45-lowlatency-64k",
"binary_version": "6.5.0-45.45.1~22.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.2.0-1015-nvidia",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-buildinfo-6.2.0-1015-nvidia-64k",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-headers-6.2.0-1015-nvidia",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-headers-6.2.0-1015-nvidia-64k",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-image-unsigned-6.2.0-1015-nvidia",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-image-unsigned-6.2.0-1015-nvidia-64k",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-modules-6.2.0-1015-nvidia",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-modules-6.2.0-1015-nvidia-64k",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-modules-extra-6.2.0-1015-nvidia",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-modules-nvidia-fs-6.2.0-1015-nvidia",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-modules-nvidia-fs-6.2.0-1015-nvidia-64k",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-nvidia-6.2-headers-6.2.0-1015",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-nvidia-6.2-tools-6.2.0-1015",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-nvidia-6.2-tools-host",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-tools-6.2.0-1015-nvidia",
"binary_version": "6.2.0-1015.15"
},
{
"binary_name": "linux-tools-6.2.0-1015-nvidia-64k",
"binary_version": "6.2.0-1015.15"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.5.0-1024-nvidia",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-buildinfo-6.5.0-1024-nvidia-64k",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-headers-6.5.0-1024-nvidia",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-headers-6.5.0-1024-nvidia-64k",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-image-unsigned-6.5.0-1024-nvidia",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-image-unsigned-6.5.0-1024-nvidia-64k",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-modules-6.5.0-1024-nvidia",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-modules-6.5.0-1024-nvidia-64k",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-modules-extra-6.5.0-1024-nvidia",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-modules-nvidia-fs-6.5.0-1024-nvidia",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-modules-nvidia-fs-6.5.0-1024-nvidia-64k",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-nvidia-6.5-headers-6.5.0-1024",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-nvidia-6.5-tools-6.5.0-1024",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-nvidia-6.5-tools-host",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-tools-6.5.0-1024-nvidia",
"binary_version": "6.5.0-1024.25"
},
{
"binary_name": "linux-tools-6.5.0-1024-nvidia-64k",
"binary_version": "6.5.0-1024.25"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.17.0-1035-oem",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-headers-5.17.0-1035-oem",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-image-unsigned-5.17.0-1035-oem",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-modules-5.17.0-1035-oem",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-modules-ipu6-5.17.0-1035-oem",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-modules-ivsc-5.17.0-1035-oem",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-modules-iwlwifi-5.17.0-1035-oem",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-oem-5.17-headers-5.17.0-1035",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-oem-5.17-tools-5.17.0-1035",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-oem-5.17-tools-host",
"binary_version": "5.17.0-1035.36"
},
{
"binary_name": "linux-tools-5.17.0-1035-oem",
"binary_version": "5.17.0-1035.36"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.0.0-1021-oem",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-headers-6.0.0-1021-oem",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-image-unsigned-6.0.0-1021-oem",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-modules-6.0.0-1021-oem",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-modules-ipu6-6.0.0-1021-oem",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-modules-ivsc-6.0.0-1021-oem",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-modules-iwlwifi-6.0.0-1021-oem",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-oem-6.0-headers-6.0.0-1021",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-oem-6.0-tools-6.0.0-1021",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-oem-6.0-tools-host",
"binary_version": "6.0.0-1021.21"
},
{
"binary_name": "linux-tools-6.0.0-1021-oem",
"binary_version": "6.0.0-1021.21"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.1.0-1036-oem",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-headers-6.1.0-1036-oem",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-image-unsigned-6.1.0-1036-oem",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-modules-6.1.0-1036-oem",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-modules-ipu6-6.1.0-1036-oem",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-modules-ivsc-6.1.0-1036-oem",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-modules-iwlwifi-6.1.0-1036-oem",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-oem-6.1-headers-6.1.0-1036",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-oem-6.1-tools-6.1.0-1036",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-oem-6.1-tools-host",
"binary_version": "6.1.0-1036.36"
},
{
"binary_name": "linux-tools-6.1.0-1036-oem",
"binary_version": "6.1.0-1036.36"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-headers-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-image-unsigned-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-modules-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-modules-ipu6-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-modules-ivsc-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-modules-iwlwifi-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-modules-usbio-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-oem-6.5-headers-6.5.0-1027",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-oem-6.5-lib-rust-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-oem-6.5-tools-6.5.0-1027",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-oem-6.5-tools-host",
"binary_version": "6.5.0-1027.28"
},
{
"binary_name": "linux-tools-6.5.0-1027-oem",
"binary_version": "6.5.0-1027.28"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1009-oracle",
"binary_version": "5.15.0-1009.12"
},
{
"binary_name": "linux-headers-5.15.0-1009-oracle",
"binary_version": "5.15.0-1009.12"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1009-oracle",
"binary_version": "5.15.0-1009.12"
},
{
"binary_name": "linux-modules-5.15.0-1009-oracle",
"binary_version": "5.15.0-1009.12"
},
{
"binary_name": "linux-modules-extra-5.15.0-1009-oracle",
"binary_version": "5.15.0-1009.12"
},
{
"binary_name": "linux-oracle-headers-5.15.0-1009",
"binary_version": "5.15.0-1009.12"
},
{
"binary_name": "linux-oracle-tools-5.15.0-1009",
"binary_version": "5.15.0-1009.12"
},
{
"binary_name": "linux-tools-5.15.0-1009-oracle",
"binary_version": "5.15.0-1009.12"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.5.0-1027-oracle",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-buildinfo-6.5.0-1027-oracle-64k",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-1027-oracle",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-1027-oracle-64k",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-1027-oracle",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-image-unsigned-6.5.0-1027-oracle-64k",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-1027-oracle",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-1027-oracle-64k",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.5.0-1027-oracle",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.5.0-1027-oracle-64k",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-oracle-6.5-headers-6.5.0-1027",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-oracle-6.5-tools-6.5.0-1027",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-1027-oracle",
"binary_version": "6.5.0-1027.27~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-1027-oracle-64k",
"binary_version": "6.5.0-1027.27~22.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1011-raspi",
"binary_version": "5.15.0-1011.13"
},
{
"binary_name": "linux-buildinfo-5.15.0-1011-raspi-nolpae",
"binary_version": "5.15.0-1011.13"
},
{
"binary_name": "linux-headers-5.15.0-1011-raspi",
"binary_version": "5.15.0-1011.13"
},
{
"binary_name": "linux-headers-5.15.0-1011-raspi-nolpae",
"binary_version": "5.15.0-1011.13"
},
{
"binary_name": "linux-image-5.15.0-1011-raspi",
"binary_version": "5.15.0-1011.13"
},
{
"binary_name": "linux-image-5.15.0-1011-raspi-nolpae",
"binary_version": "5.15.0-1011.13"
},
{
"binary_name": "linux-modules-5.15.0-1011-raspi",
"binary_version": "5.15.0-1011.13"
},
{
"binary_name": "linux-modules-5.15.0-1011-raspi-nolpae",
"binary_version": "5.15.0-1011.13"
},
{
"binary_name": "linux-modules-extra-5.15.0-1011-raspi",
"binary_version": "5.15.0-1011.13"
},
{
"binary_name": "linux-modules-extra-5.15.0-1011-raspi-nolpae",
"binary_version": "5.15.0-1011.13"
},
{
"binary_name": "linux-raspi-headers-5.15.0-1011",
"binary_version": "5.15.0-1011.13"
},
{
"binary_name": "linux-raspi-tools-5.15.0-1011",
"binary_version": "5.15.0-1011.13"
},
{
"binary_name": "linux-tools-5.15.0-1011-raspi",
"binary_version": "5.15.0-1011.13"
},
{
"binary_name": "linux-tools-5.15.0-1011-raspi-nolpae",
"binary_version": "5.15.0-1011.13"
}
],
"availability": "No subscription required"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1032-realtime",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1032-realtime",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-headers-5.15.0-1032-realtime",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1032-realtime",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-modules-5.15.0-1032-realtime",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-modules-extra-5.15.0-1032-realtime",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-realtime-cloud-tools-5.15.0-1032",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-realtime-cloud-tools-common",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-realtime-headers-5.15.0-1032",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-realtime-tools-5.15.0-1032",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-realtime-tools-common",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-realtime-tools-host",
"binary_version": "5.15.0-1032.35"
},
{
"binary_name": "linux-tools-5.15.0-1032-realtime",
"binary_version": "5.15.0-1032.35"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1028-generic",
"binary_version": "5.15.0-1028.32"
},
{
"binary_name": "linux-headers-5.15.0-1028-generic",
"binary_version": "5.15.0-1028.32"
},
{
"binary_name": "linux-image-5.15.0-1028-generic",
"binary_version": "5.15.0-1028.32"
},
{
"binary_name": "linux-modules-5.15.0-1028-generic",
"binary_version": "5.15.0-1028.32"
},
{
"binary_name": "linux-modules-extra-5.15.0-1028-generic",
"binary_version": "5.15.0-1028.32"
},
{
"binary_name": "linux-riscv-headers-5.15.0-1028",
"binary_version": "5.15.0-1028.32"
},
{
"binary_name": "linux-riscv-tools-5.15.0-1028",
"binary_version": "5.15.0-1028.32"
},
{
"binary_name": "linux-tools-5.15.0-1028-generic",
"binary_version": "5.15.0-1028.32"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.19.0-1021-generic",
"binary_version": "5.19.0-1021.23~22.04.1"
},
{
"binary_name": "linux-headers-5.19.0-1021-generic",
"binary_version": "5.19.0-1021.23~22.04.1"
},
{
"binary_name": "linux-image-5.19.0-1021-generic",
"binary_version": "5.19.0-1021.23~22.04.1"
},
{
"binary_name": "linux-modules-5.19.0-1021-generic",
"binary_version": "5.19.0-1021.23~22.04.1"
},
{
"binary_name": "linux-modules-extra-5.19.0-1021-generic",
"binary_version": "5.19.0-1021.23~22.04.1"
},
{
"binary_name": "linux-riscv-5.19-headers-5.19.0-1021",
"binary_version": "5.19.0-1021.23~22.04.1"
},
{
"binary_name": "linux-riscv-5.19-tools-5.19.0-1021",
"binary_version": "5.19.0-1021.23~22.04.1"
},
{
"binary_name": "linux-tools-5.19.0-1021-generic",
"binary_version": "5.19.0-1021.23~22.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.5.0-45-generic",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-45-generic",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-image-6.5.0-45-generic",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-45-generic",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.5.0-45-generic",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-riscv-6.5-headers-6.5.0-45",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-riscv-6.5-tools-6.5.0-45",
"binary_version": "6.5.0-45.45.1~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-45-generic",
"binary_version": "6.5.0-45.45.1~22.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.19.0-1020-starfive",
"binary_version": "5.19.0-1020.22~22.04.1"
},
{
"binary_name": "linux-headers-5.19.0-1020-starfive",
"binary_version": "5.19.0-1020.22~22.04.1"
},
{
"binary_name": "linux-image-5.19.0-1020-starfive",
"binary_version": "5.19.0-1020.22~22.04.1"
},
{
"binary_name": "linux-modules-5.19.0-1020-starfive",
"binary_version": "5.19.0-1020.22~22.04.1"
},
{
"binary_name": "linux-modules-extra-5.19.0-1020-starfive",
"binary_version": "5.19.0-1020.22~22.04.1"
},
{
"binary_name": "linux-starfive-5.19-headers-5.19.0-1020",
"binary_version": "5.19.0-1020.22~22.04.1"
},
{
"binary_name": "linux-starfive-5.19-tools-5.19.0-1020",
"binary_version": "5.19.0-1020.22~22.04.1"
},
{
"binary_name": "linux-tools-5.19.0-1020-starfive",
"binary_version": "5.19.0-1020.22~22.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.2.0-1009-starfive",
"binary_version": "6.2.0-1009.10~22.04.1"
},
{
"binary_name": "linux-headers-6.2.0-1009-starfive",
"binary_version": "6.2.0-1009.10~22.04.1"
},
{
"binary_name": "linux-image-6.2.0-1009-starfive",
"binary_version": "6.2.0-1009.10~22.04.1"
},
{
"binary_name": "linux-modules-6.2.0-1009-starfive",
"binary_version": "6.2.0-1009.10~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.2.0-1009-starfive",
"binary_version": "6.2.0-1009.10~22.04.1"
},
{
"binary_name": "linux-starfive-6.2-headers-6.2.0-1009",
"binary_version": "6.2.0-1009.10~22.04.1"
},
{
"binary_name": "linux-starfive-6.2-tools-6.2.0-1009",
"binary_version": "6.2.0-1009.10~22.04.1"
},
{
"binary_name": "linux-tools-6.2.0-1009-starfive",
"binary_version": "6.2.0-1009.10~22.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.5.0-1018-starfive",
"binary_version": "6.5.0-1018.19~22.04.1"
},
{
"binary_name": "linux-headers-6.5.0-1018-starfive",
"binary_version": "6.5.0-1018.19~22.04.1"
},
{
"binary_name": "linux-image-6.5.0-1018-starfive",
"binary_version": "6.5.0-1018.19~22.04.1"
},
{
"binary_name": "linux-modules-6.5.0-1018-starfive",
"binary_version": "6.5.0-1018.19~22.04.1"
},
{
"binary_name": "linux-modules-extra-6.5.0-1018-starfive",
"binary_version": "6.5.0-1018.19~22.04.1"
},
{
"binary_name": "linux-starfive-6.5-headers-6.5.0-1018",
"binary_version": "6.5.0-1018.19~22.04.1"
},
{
"binary_name": "linux-starfive-6.5-tools-6.5.0-1018",
"binary_version": "6.5.0-1018.19~22.04.1"
},
{
"binary_name": "linux-tools-6.5.0-1018-starfive",
"binary_version": "6.5.0-1018.19~22.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-6.8.0-2019-raspi-realtime",
"binary_version": "6.8.0-2019.20"
},
{
"binary_name": "linux-headers-6.8.0-2019-raspi-realtime",
"binary_version": "6.8.0-2019.20"
},
{
"binary_name": "linux-image-6.8.0-2019-raspi-realtime",
"binary_version": "6.8.0-2019.20"
},
{
"binary_name": "linux-modules-6.8.0-2019-raspi-realtime",
"binary_version": "6.8.0-2019.20"
},
{
"binary_name": "linux-raspi-realtime-headers-6.8.0-2019",
"binary_version": "6.8.0-2019.20"
},
{
"binary_name": "linux-raspi-realtime-tools-6.8.0-2019",
"binary_version": "6.8.0-2019.20"
},
{
"binary_name": "linux-tools-6.8.0-2019-raspi-realtime",
"binary_version": "6.8.0-2019.20"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-azure-cloud-tools-4.15.0-1146",
"binary_version": "4.15.0-1146.161~14.04.1"
},
{
"binary_name": "linux-azure-headers-4.15.0-1146",
"binary_version": "4.15.0-1146.161~14.04.1"
},
{
"binary_name": "linux-azure-tools-4.15.0-1146",
"binary_version": "4.15.0-1146.161~14.04.1"
},
{
"binary_name": "linux-buildinfo-4.15.0-1146-azure",
"binary_version": "4.15.0-1146.161~14.04.1"
},
{
"binary_name": "linux-cloud-tools-4.15.0-1146-azure",
"binary_version": "4.15.0-1146.161~14.04.1"
},
{
"binary_name": "linux-headers-4.15.0-1146-azure",
"binary_version": "4.15.0-1146.161~14.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1146-azure",
"binary_version": "4.15.0-1146.161~14.04.1"
},
{
"binary_name": "linux-modules-4.15.0-1146-azure",
"binary_version": "4.15.0-1146.161~14.04.1"
},
{
"binary_name": "linux-modules-extra-4.15.0-1146-azure",
"binary_version": "4.15.0-1146.161~14.04.1"
},
{
"binary_name": "linux-tools-4.15.0-1146-azure",
"binary_version": "4.15.0-1146.161~14.04.1"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "block-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "crypto-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "fat-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "fb-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "firewire-core-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "floppy-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "fs-core-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "fs-secondary-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "input-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "ipmi-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "irda-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "kernel-image-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "linux-buildinfo-3.13.0-209-generic",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "linux-buildinfo-3.13.0-209-lowlatency",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "linux-cloud-tools-3.13.0-209",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "linux-cloud-tools-3.13.0-209-generic",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "linux-cloud-tools-3.13.0-209-lowlatency",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "linux-cloud-tools-common",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "linux-headers-3.13.0-209",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "linux-headers-3.13.0-209-generic",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "linux-headers-3.13.0-209-lowlatency",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "linux-image-unsigned-3.13.0-209-generic",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "linux-image-unsigned-3.13.0-209-lowlatency",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "linux-libc-dev",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "linux-modules-3.13.0-209-generic",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "linux-modules-3.13.0-209-lowlatency",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "linux-modules-extra-3.13.0-209-generic",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "linux-source-3.13.0",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "linux-tools-3.13.0-209",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "linux-tools-3.13.0-209-generic",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "linux-tools-3.13.0-209-lowlatency",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "linux-tools-common",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "linux-udebs-generic",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "md-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "message-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "mouse-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "multipath-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "nfs-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "nic-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "nic-pcmcia-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "nic-shared-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "nic-usb-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "parport-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "pata-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "pcmcia-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "pcmcia-storage-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "plip-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "ppp-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "sata-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "scsi-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "serial-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "speakup-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "squashfs-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "storage-core-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "usb-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "virtio-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
},
{
"binary_name": "vlan-modules-3.13.0-209-generic-di",
"binary_version": "3.13.0-209.260"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-aws-cloud-tools-4.4.0-1150",
"binary_version": "4.4.0-1150.156"
},
{
"binary_name": "linux-aws-headers-4.4.0-1150",
"binary_version": "4.4.0-1150.156"
},
{
"binary_name": "linux-aws-tools-4.4.0-1150",
"binary_version": "4.4.0-1150.156"
},
{
"binary_name": "linux-buildinfo-4.4.0-1150-aws",
"binary_version": "4.4.0-1150.156"
},
{
"binary_name": "linux-cloud-tools-4.4.0-1150-aws",
"binary_version": "4.4.0-1150.156"
},
{
"binary_name": "linux-headers-4.4.0-1150-aws",
"binary_version": "4.4.0-1150.156"
},
{
"binary_name": "linux-image-4.4.0-1150-aws",
"binary_version": "4.4.0-1150.156"
},
{
"binary_name": "linux-modules-4.4.0-1150-aws",
"binary_version": "4.4.0-1150.156"
},
{
"binary_name": "linux-tools-4.4.0-1150-aws",
"binary_version": "4.4.0-1150.156"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "block-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "crypto-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "fat-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "fb-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "firewire-core-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "floppy-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "fs-core-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "fs-secondary-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "input-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "ipmi-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "irda-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "kernel-image-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "linux-buildinfo-4.4.0-276-generic",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "linux-buildinfo-4.4.0-276-lowlatency",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "linux-cloud-tools-4.4.0-276-generic",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "linux-cloud-tools-4.4.0-276-lowlatency",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "linux-headers-4.4.0-276",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "linux-headers-4.4.0-276-generic",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "linux-headers-4.4.0-276-lowlatency",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "linux-image-4.4.0-276-generic",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "linux-image-unsigned-4.4.0-276-generic",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "linux-image-unsigned-4.4.0-276-lowlatency",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "linux-lts-xenial-cloud-tools-4.4.0-276",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "linux-lts-xenial-tools-4.4.0-276",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "linux-lts-xenial-udebs-generic",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "linux-modules-4.4.0-276-generic",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "linux-modules-4.4.0-276-lowlatency",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "linux-modules-extra-4.4.0-276-generic",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "linux-tools-4.4.0-276-generic",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "linux-tools-4.4.0-276-lowlatency",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "md-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "message-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "mouse-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "multipath-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "nfs-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "nic-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "nic-pcmcia-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "nic-shared-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "nic-usb-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "parport-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "pata-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "pcmcia-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "pcmcia-storage-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "plip-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "ppp-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "sata-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "scsi-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "serial-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "speakup-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "storage-core-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "usb-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "virtio-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
},
{
"binary_name": "vlan-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310~14.04.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "block-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "crypto-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "dasd-extra-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "dasd-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "fat-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "fb-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "firewire-core-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "floppy-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "fs-core-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "fs-secondary-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "input-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "ipmi-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "irda-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "kernel-image-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "linux-buildinfo-4.4.0-276-generic",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "linux-buildinfo-4.4.0-276-lowlatency",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "linux-cloud-tools-4.4.0-276",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "linux-cloud-tools-4.4.0-276-generic",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "linux-cloud-tools-4.4.0-276-lowlatency",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "linux-cloud-tools-common",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "linux-headers-4.4.0-276",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "linux-headers-4.4.0-276-generic",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "linux-headers-4.4.0-276-lowlatency",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "linux-image-4.4.0-276-generic",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "linux-image-unsigned-4.4.0-276-generic",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "linux-image-unsigned-4.4.0-276-lowlatency",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "linux-libc-dev",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "linux-modules-4.4.0-276-generic",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "linux-modules-4.4.0-276-lowlatency",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "linux-modules-extra-4.4.0-276-generic",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "linux-source-4.4.0",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "linux-tools-4.4.0-276",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "linux-tools-4.4.0-276-generic",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "linux-tools-4.4.0-276-lowlatency",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "linux-tools-common",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "linux-tools-host",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "linux-udebs-generic",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "md-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "message-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "mouse-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "multipath-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "nfs-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "nic-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "nic-pcmcia-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "nic-shared-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "nic-usb-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "parport-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "pata-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "pcmcia-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "pcmcia-storage-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "plip-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "ppp-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "sata-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "scsi-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "serial-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "speakup-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "storage-core-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "usb-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "virtio-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
},
{
"binary_name": "vlan-modules-4.4.0-276-generic-di",
"binary_version": "4.4.0-276.310"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-aws-cloud-tools-4.4.0-1188",
"binary_version": "4.4.0-1188.203"
},
{
"binary_name": "linux-aws-headers-4.4.0-1188",
"binary_version": "4.4.0-1188.203"
},
{
"binary_name": "linux-aws-tools-4.4.0-1188",
"binary_version": "4.4.0-1188.203"
},
{
"binary_name": "linux-buildinfo-4.4.0-1188-aws",
"binary_version": "4.4.0-1188.203"
},
{
"binary_name": "linux-cloud-tools-4.4.0-1188-aws",
"binary_version": "4.4.0-1188.203"
},
{
"binary_name": "linux-headers-4.4.0-1188-aws",
"binary_version": "4.4.0-1188.203"
},
{
"binary_name": "linux-image-4.4.0-1188-aws",
"binary_version": "4.4.0-1188.203"
},
{
"binary_name": "linux-modules-4.4.0-1188-aws",
"binary_version": "4.4.0-1188.203"
},
{
"binary_name": "linux-modules-extra-4.4.0-1188-aws",
"binary_version": "4.4.0-1188.203"
},
{
"binary_name": "linux-tools-4.4.0-1188-aws",
"binary_version": "4.4.0-1188.203"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-aws-headers-4.15.0-1137",
"binary_version": "4.15.0-1137.148~16.04.1"
},
{
"binary_name": "linux-aws-hwe-cloud-tools-4.15.0-1137",
"binary_version": "4.15.0-1137.148~16.04.1"
},
{
"binary_name": "linux-aws-hwe-tools-4.15.0-1137",
"binary_version": "4.15.0-1137.148~16.04.1"
},
{
"binary_name": "linux-buildinfo-4.15.0-1137-aws",
"binary_version": "4.15.0-1137.148~16.04.1"
},
{
"binary_name": "linux-cloud-tools-4.15.0-1137-aws",
"binary_version": "4.15.0-1137.148~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-1137-aws",
"binary_version": "4.15.0-1137.148~16.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1137-aws",
"binary_version": "4.15.0-1137.148~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-1137-aws",
"binary_version": "4.15.0-1137.148~16.04.1"
},
{
"binary_name": "linux-modules-extra-4.15.0-1137-aws",
"binary_version": "4.15.0-1137.148~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-1137-aws",
"binary_version": "4.15.0-1137.148~16.04.1"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-azure-cloud-tools-4.15.0-1146",
"binary_version": "4.15.0-1146.161~16.04.1"
},
{
"binary_name": "linux-azure-headers-4.15.0-1146",
"binary_version": "4.15.0-1146.161~16.04.1"
},
{
"binary_name": "linux-azure-tools-4.15.0-1146",
"binary_version": "4.15.0-1146.161~16.04.1"
},
{
"binary_name": "linux-buildinfo-4.15.0-1146-azure",
"binary_version": "4.15.0-1146.161~16.04.1"
},
{
"binary_name": "linux-cloud-tools-4.15.0-1146-azure",
"binary_version": "4.15.0-1146.161~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-1146-azure",
"binary_version": "4.15.0-1146.161~16.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1146-azure",
"binary_version": "4.15.0-1146.161~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-1146-azure",
"binary_version": "4.15.0-1146.161~16.04.1"
},
{
"binary_name": "linux-modules-extra-4.15.0-1146-azure",
"binary_version": "4.15.0-1146.161~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-1146-azure",
"binary_version": "4.15.0-1146.161~16.04.1"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1131-gcp",
"binary_version": "4.15.0-1131.147~16.04.1"
},
{
"binary_name": "linux-gcp-headers-4.15.0-1131",
"binary_version": "4.15.0-1131.147~16.04.1"
},
{
"binary_name": "linux-gcp-tools-4.15.0-1131",
"binary_version": "4.15.0-1131.147~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-1131-gcp",
"binary_version": "4.15.0-1131.147~16.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1131-gcp",
"binary_version": "4.15.0-1131.147~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-1131-gcp",
"binary_version": "4.15.0-1131.147~16.04.1"
},
{
"binary_name": "linux-modules-extra-4.15.0-1131-gcp",
"binary_version": "4.15.0-1131.147~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-1131-gcp",
"binary_version": "4.15.0-1131.147~16.04.1"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "block-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "crypto-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "dasd-extra-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "dasd-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "fat-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "fb-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "firewire-core-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "floppy-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "fs-core-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "fs-secondary-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "input-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "ipmi-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "irda-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "kernel-image-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "linux-buildinfo-4.15.0-189-generic",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "linux-buildinfo-4.15.0-189-lowlatency",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "linux-cloud-tools-4.15.0-189-generic",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "linux-cloud-tools-4.15.0-189-lowlatency",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-189",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-189-generic",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-189-lowlatency",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "linux-hwe-cloud-tools-4.15.0-189",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "linux-hwe-tools-4.15.0-189",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "linux-hwe-udebs-generic",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "linux-image-4.15.0-189-generic",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-189-generic",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-189-lowlatency",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-189-generic",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-189-lowlatency",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "linux-modules-extra-4.15.0-189-generic",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "linux-source-4.15.0",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-189-generic",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-189-lowlatency",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "md-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "message-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "mouse-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "multipath-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "nfs-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "nic-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "nic-pcmcia-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "nic-shared-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "nic-usb-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "parport-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "pata-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "pcmcia-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "pcmcia-storage-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "plip-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "ppp-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "sata-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "scsi-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "serial-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "storage-core-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "usb-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "virtio-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
},
{
"binary_name": "vlan-modules-4.15.0-189-generic-di",
"binary_version": "4.15.0-189.200~16.04.1"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-4.4.0-1151-kvm",
"binary_version": "4.4.0-1151.162"
},
{
"binary_name": "linux-cloud-tools-4.4.0-1151-kvm",
"binary_version": "4.4.0-1151.162"
},
{
"binary_name": "linux-headers-4.4.0-1151-kvm",
"binary_version": "4.4.0-1151.162"
},
{
"binary_name": "linux-image-4.4.0-1151-kvm",
"binary_version": "4.4.0-1151.162"
},
{
"binary_name": "linux-kvm-cloud-tools-4.4.0-1151",
"binary_version": "4.4.0-1151.162"
},
{
"binary_name": "linux-kvm-headers-4.4.0-1151",
"binary_version": "4.4.0-1151.162"
},
{
"binary_name": "linux-kvm-tools-4.4.0-1151",
"binary_version": "4.4.0-1151.162"
},
{
"binary_name": "linux-modules-4.4.0-1151-kvm",
"binary_version": "4.4.0-1151.162"
},
{
"binary_name": "linux-tools-4.4.0-1151-kvm",
"binary_version": "4.4.0-1151.162"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1102-oracle",
"binary_version": "4.15.0-1102.113~16.04.1"
},
{
"binary_name": "linux-headers-4.15.0-1102-oracle",
"binary_version": "4.15.0-1102.113~16.04.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1102-oracle",
"binary_version": "4.15.0-1102.113~16.04.1"
},
{
"binary_name": "linux-modules-4.15.0-1102-oracle",
"binary_version": "4.15.0-1102.113~16.04.1"
},
{
"binary_name": "linux-modules-extra-4.15.0-1102-oracle",
"binary_version": "4.15.0-1102.113~16.04.1"
},
{
"binary_name": "linux-oracle-headers-4.15.0-1102",
"binary_version": "4.15.0-1102.113~16.04.1"
},
{
"binary_name": "linux-oracle-tools-4.15.0-1102",
"binary_version": "4.15.0-1102.113~16.04.1"
},
{
"binary_name": "linux-tools-4.15.0-1102-oracle",
"binary_version": "4.15.0-1102.113~16.04.1"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.15.0-1014-realtime",
"binary_version": "5.15.0-1014.14"
},
{
"binary_name": "linux-cloud-tools-5.15.0-1014-realtime",
"binary_version": "5.15.0-1014.14"
},
{
"binary_name": "linux-headers-5.15.0-1014-realtime",
"binary_version": "5.15.0-1014.14"
},
{
"binary_name": "linux-image-unsigned-5.15.0-1014-realtime",
"binary_version": "5.15.0-1014.14"
},
{
"binary_name": "linux-modules-5.15.0-1014-realtime",
"binary_version": "5.15.0-1014.14"
},
{
"binary_name": "linux-modules-extra-5.15.0-1014-realtime",
"binary_version": "5.15.0-1014.14"
},
{
"binary_name": "linux-realtime-cloud-tools-5.15.0-1014",
"binary_version": "5.15.0-1014.14"
},
{
"binary_name": "linux-realtime-cloud-tools-common",
"binary_version": "5.15.0-1014.14"
},
{
"binary_name": "linux-realtime-headers-5.15.0-1014",
"binary_version": "5.15.0-1014.14"
},
{
"binary_name": "linux-realtime-tools-5.15.0-1014",
"binary_version": "5.15.0-1014.14"
},
{
"binary_name": "linux-realtime-tools-common",
"binary_version": "5.15.0-1014.14"
},
{
"binary_name": "linux-realtime-tools-host",
"binary_version": "5.15.0-1014.14"
},
{
"binary_name": "linux-tools-5.15.0-1014-realtime",
"binary_version": "5.15.0-1014.14"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-aws-fips-headers-4.15.0-2076",
"binary_version": "4.15.0-2076.81"
},
{
"binary_name": "linux-aws-fips-tools-4.15.0-2076",
"binary_version": "4.15.0-2076.81"
},
{
"binary_name": "linux-buildinfo-4.15.0-2076-aws-fips",
"binary_version": "4.15.0-2076.81"
},
{
"binary_name": "linux-headers-4.15.0-2076-aws-fips",
"binary_version": "4.15.0-2076.81"
},
{
"binary_name": "linux-image-unsigned-4.15.0-2076-aws-fips",
"binary_version": "4.15.0-2076.81"
},
{
"binary_name": "linux-image-unsigned-hmac-4.15.0-2076-aws-fips",
"binary_version": "4.15.0-2076.81"
},
{
"binary_name": "linux-modules-4.15.0-2076-aws-fips",
"binary_version": "4.15.0-2076.81"
},
{
"binary_name": "linux-modules-extra-4.15.0-2076-aws-fips",
"binary_version": "4.15.0-2076.81"
},
{
"binary_name": "linux-tools-4.15.0-2076-aws-fips",
"binary_version": "4.15.0-2076.81"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-azure-fips-cloud-tools-4.15.0-2057",
"binary_version": "4.15.0-2057.63"
},
{
"binary_name": "linux-azure-fips-headers-4.15.0-2057",
"binary_version": "4.15.0-2057.63"
},
{
"binary_name": "linux-azure-fips-tools-4.15.0-2057",
"binary_version": "4.15.0-2057.63"
},
{
"binary_name": "linux-buildinfo-4.15.0-2057-azure-fips",
"binary_version": "4.15.0-2057.63"
},
{
"binary_name": "linux-cloud-tools-4.15.0-2057-azure-fips",
"binary_version": "4.15.0-2057.63"
},
{
"binary_name": "linux-headers-4.15.0-2057-azure-fips",
"binary_version": "4.15.0-2057.63"
},
{
"binary_name": "linux-image-unsigned-4.15.0-2057-azure-fips",
"binary_version": "4.15.0-2057.63"
},
{
"binary_name": "linux-image-unsigned-hmac-4.15.0-2057-azure-fips",
"binary_version": "4.15.0-2057.63"
},
{
"binary_name": "linux-modules-4.15.0-2057-azure-fips",
"binary_version": "4.15.0-2057.63"
},
{
"binary_name": "linux-modules-extra-4.15.0-2057-azure-fips",
"binary_version": "4.15.0-2057.63"
},
{
"binary_name": "linux-tools-4.15.0-2057-azure-fips",
"binary_version": "4.15.0-2057.63"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1094-fips",
"binary_version": "4.15.0-1094.105"
},
{
"binary_name": "linux-fips-headers-4.15.0-1094",
"binary_version": "4.15.0-1094.105"
},
{
"binary_name": "linux-fips-tools-4.15.0-1094",
"binary_version": "4.15.0-1094.105"
},
{
"binary_name": "linux-fips-tools-host",
"binary_version": "4.15.0-1094.105"
},
{
"binary_name": "linux-headers-4.15.0-1094-fips",
"binary_version": "4.15.0-1094.105"
},
{
"binary_name": "linux-image-4.15.0-1094-fips",
"binary_version": "4.15.0-1094.105"
},
{
"binary_name": "linux-image-hmac-4.15.0-1094-fips",
"binary_version": "4.15.0-1094.105"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1094-fips",
"binary_version": "4.15.0-1094.105"
},
{
"binary_name": "linux-image-unsigned-hmac-4.15.0-1094-fips",
"binary_version": "4.15.0-1094.105"
},
{
"binary_name": "linux-modules-4.15.0-1094-fips",
"binary_version": "4.15.0-1094.105"
},
{
"binary_name": "linux-modules-extra-4.15.0-1094-fips",
"binary_version": "4.15.0-1094.105"
},
{
"binary_name": "linux-tools-4.15.0-1094-fips",
"binary_version": "4.15.0-1094.105"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-2041-gcp-fips",
"binary_version": "4.15.0-2041.46"
},
{
"binary_name": "linux-gcp-fips-headers-4.15.0-2041",
"binary_version": "4.15.0-2041.46"
},
{
"binary_name": "linux-gcp-fips-tools-4.15.0-2041",
"binary_version": "4.15.0-2041.46"
},
{
"binary_name": "linux-headers-4.15.0-2041-gcp-fips",
"binary_version": "4.15.0-2041.46"
},
{
"binary_name": "linux-image-unsigned-4.15.0-2041-gcp-fips",
"binary_version": "4.15.0-2041.46"
},
{
"binary_name": "linux-image-unsigned-hmac-4.15.0-2041-gcp-fips",
"binary_version": "4.15.0-2041.46"
},
{
"binary_name": "linux-modules-4.15.0-2041-gcp-fips",
"binary_version": "4.15.0-2041.46"
},
{
"binary_name": "linux-modules-extra-4.15.0-2041-gcp-fips",
"binary_version": "4.15.0-2041.46"
},
{
"binary_name": "linux-tools-4.15.0-2041-gcp-fips",
"binary_version": "4.15.0-2041.46"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-aws-fips-headers-5.4.0-1081",
"binary_version": "5.4.0-1081.88+fips1"
},
{
"binary_name": "linux-aws-fips-tools-5.4.0-1081",
"binary_version": "5.4.0-1081.88+fips1"
},
{
"binary_name": "linux-buildinfo-5.4.0-1081-aws-fips",
"binary_version": "5.4.0-1081.88+fips1"
},
{
"binary_name": "linux-headers-5.4.0-1081-aws-fips",
"binary_version": "5.4.0-1081.88+fips1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1081-aws-fips",
"binary_version": "5.4.0-1081.88+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.4.0-1081-aws-fips",
"binary_version": "5.4.0-1081.88+fips1"
},
{
"binary_name": "linux-modules-5.4.0-1081-aws-fips",
"binary_version": "5.4.0-1081.88+fips1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1081-aws-fips",
"binary_version": "5.4.0-1081.88+fips1"
},
{
"binary_name": "linux-tools-5.4.0-1081-aws-fips",
"binary_version": "5.4.0-1081.88+fips1"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-azure-fips-cloud-tools-5.4.0-1086",
"binary_version": "5.4.0-1086.91+fips1"
},
{
"binary_name": "linux-azure-fips-headers-5.4.0-1086",
"binary_version": "5.4.0-1086.91+fips1"
},
{
"binary_name": "linux-azure-fips-tools-5.4.0-1086",
"binary_version": "5.4.0-1086.91+fips1"
},
{
"binary_name": "linux-buildinfo-5.4.0-1086-azure-fips",
"binary_version": "5.4.0-1086.91+fips1"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1086-azure-fips",
"binary_version": "5.4.0-1086.91+fips1"
},
{
"binary_name": "linux-headers-5.4.0-1086-azure-fips",
"binary_version": "5.4.0-1086.91+fips1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1086-azure-fips",
"binary_version": "5.4.0-1086.91+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.4.0-1086-azure-fips",
"binary_version": "5.4.0-1086.91+fips1"
},
{
"binary_name": "linux-modules-5.4.0-1086-azure-fips",
"binary_version": "5.4.0-1086.91+fips1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1086-azure-fips",
"binary_version": "5.4.0-1086.91+fips1"
},
{
"binary_name": "linux-tools-5.4.0-1086-azure-fips",
"binary_version": "5.4.0-1086.91+fips1"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1057-fips",
"binary_version": "5.4.0-1057.65"
},
{
"binary_name": "linux-fips-headers-5.4.0-1057",
"binary_version": "5.4.0-1057.65"
},
{
"binary_name": "linux-fips-tools-5.4.0-1057",
"binary_version": "5.4.0-1057.65"
},
{
"binary_name": "linux-fips-tools-host",
"binary_version": "5.4.0-1057.65"
},
{
"binary_name": "linux-headers-5.4.0-1057-fips",
"binary_version": "5.4.0-1057.65"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1057-fips",
"binary_version": "5.4.0-1057.65"
},
{
"binary_name": "linux-image-unsigned-hmac-5.4.0-1057-fips",
"binary_version": "5.4.0-1057.65"
},
{
"binary_name": "linux-modules-5.4.0-1057-fips",
"binary_version": "5.4.0-1057.65"
},
{
"binary_name": "linux-modules-extra-5.4.0-1057-fips",
"binary_version": "5.4.0-1057.65"
},
{
"binary_name": "linux-tools-5.4.0-1057-fips",
"binary_version": "5.4.0-1057.65"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1081-gcp-fips",
"binary_version": "5.4.0-1081.88+fips1"
},
{
"binary_name": "linux-gcp-fips-headers-5.4.0-1081",
"binary_version": "5.4.0-1081.88+fips1"
},
{
"binary_name": "linux-gcp-fips-tools-5.4.0-1081",
"binary_version": "5.4.0-1081.88+fips1"
},
{
"binary_name": "linux-headers-5.4.0-1081-gcp-fips",
"binary_version": "5.4.0-1081.88+fips1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1081-gcp-fips",
"binary_version": "5.4.0-1081.88+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.4.0-1081-gcp-fips",
"binary_version": "5.4.0-1081.88+fips1"
},
{
"binary_name": "linux-modules-5.4.0-1081-gcp-fips",
"binary_version": "5.4.0-1081.88+fips1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1081-gcp-fips",
"binary_version": "5.4.0-1081.88+fips1"
},
{
"binary_name": "linux-tools-5.4.0-1081-gcp-fips",
"binary_version": "5.4.0-1081.88+fips1"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "block-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "crypto-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "dasd-extra-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "dasd-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "fat-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "fb-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "firewire-core-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "floppy-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "fs-core-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "fs-secondary-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "input-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "ipmi-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "irda-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "kernel-image-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "linux-buildinfo-4.4.0-1120-fips",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "linux-fips-cloud-tools-common",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "linux-fips-headers-4.4.0-1120",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "linux-fips-source-4.4.0",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "linux-fips-tools-4.4.0-1120",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "linux-headers-4.4.0-1120-fips",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "linux-image-4.4.0-1120-fips",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "linux-image-hmac-4.4.0-1120-fips",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "linux-image-unsigned-4.4.0-1120-fips",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "linux-image-unsigned-hmac-4.4.0-1120-fips",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "linux-modules-4.4.0-1120-fips",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "linux-modules-extra-4.4.0-1120-fips",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "linux-tools-4.4.0-1120-fips",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "linux-udebs-fips",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "md-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "message-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "mouse-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "multipath-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "nfs-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "nic-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "nic-pcmcia-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "nic-shared-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "nic-usb-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "parport-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "pata-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "pcmcia-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "pcmcia-storage-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "plip-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "ppp-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "sata-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "scsi-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "serial-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "speakup-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "storage-core-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "usb-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "virtio-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
},
{
"binary_name": "vlan-modules-4.4.0-1120-fips-di",
"binary_version": "4.4.0-1120.127"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "block-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "crypto-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "dasd-extra-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "dasd-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "fat-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "fb-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "firewire-core-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "floppy-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "fs-core-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "fs-secondary-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "input-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "ipmi-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "irda-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "kernel-image-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-fips-headers-4.4.0-1002",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-fips-source-4.4.0",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-fips-tools-4.4.0-1002",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-headers-4.4.0-1002-fips",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-image-4.4.0-1002-fips",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-image-extra-4.4.0-1002-fips",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-image-hmac-4.4.0-1002-fips",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-tools-4.4.0-1002-fips",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "linux-udebs-fips",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "md-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "message-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "mouse-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "multipath-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "nfs-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "nic-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "nic-pcmcia-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "nic-shared-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "nic-usb-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "parport-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "pata-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "pcmcia-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "pcmcia-storage-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "plip-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "ppp-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "sata-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "scsi-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "serial-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "speakup-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "storage-core-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "usb-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "virtio-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
},
{
"binary_name": "vlan-modules-4.4.0-1002-fips-di",
"binary_version": "4.4.0-1002.2"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-aws-fips-headers-4.15.0-2000",
"binary_version": "4.15.0-2000.4"
},
{
"binary_name": "linux-aws-fips-tools-4.15.0-2000",
"binary_version": "4.15.0-2000.4"
},
{
"binary_name": "linux-buildinfo-4.15.0-2000-aws-fips",
"binary_version": "4.15.0-2000.4"
},
{
"binary_name": "linux-headers-4.15.0-2000-aws-fips",
"binary_version": "4.15.0-2000.4"
},
{
"binary_name": "linux-image-unsigned-4.15.0-2000-aws-fips",
"binary_version": "4.15.0-2000.4"
},
{
"binary_name": "linux-image-unsigned-hmac-4.15.0-2000-aws-fips",
"binary_version": "4.15.0-2000.4"
},
{
"binary_name": "linux-modules-4.15.0-2000-aws-fips",
"binary_version": "4.15.0-2000.4"
},
{
"binary_name": "linux-modules-extra-4.15.0-2000-aws-fips",
"binary_version": "4.15.0-2000.4"
},
{
"binary_name": "linux-tools-4.15.0-2000-aws-fips",
"binary_version": "4.15.0-2000.4"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-azure-fips-cloud-tools-4.15.0-1002",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-azure-fips-headers-4.15.0-1002",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-azure-fips-tools-4.15.0-1002",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-buildinfo-4.15.0-1002-azure-fips",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-cloud-tools-4.15.0-1002-azure-fips",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-headers-4.15.0-1002-azure-fips",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1002-azure-fips",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-image-unsigned-hmac-4.15.0-1002-azure-fips",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-modules-4.15.0-1002-azure-fips",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-modules-extra-4.15.0-1002-azure-fips",
"binary_version": "4.15.0-1002.2"
},
{
"binary_name": "linux-tools-4.15.0-1002-azure-fips",
"binary_version": "4.15.0-1002.2"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-fips-headers-4.15.0-1011",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-fips-tools-4.15.0-1011",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-fips-tools-host",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-headers-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-image-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-image-hmac-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-image-unsigned-hmac-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-modules-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-modules-extra-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
},
{
"binary_name": "linux-tools-4.15.0-1011-fips",
"binary_version": "4.15.0-1011.12"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-4.15.0-1001-gcp-fips",
"binary_version": "4.15.0-1001.1"
},
{
"binary_name": "linux-gcp-fips-headers-4.15.0-1001",
"binary_version": "4.15.0-1001.1"
},
{
"binary_name": "linux-gcp-fips-tools-4.15.0-1001",
"binary_version": "4.15.0-1001.1"
},
{
"binary_name": "linux-headers-4.15.0-1001-gcp-fips",
"binary_version": "4.15.0-1001.1"
},
{
"binary_name": "linux-image-unsigned-4.15.0-1001-gcp-fips",
"binary_version": "4.15.0-1001.1"
},
{
"binary_name": "linux-image-unsigned-hmac-4.15.0-1001-gcp-fips",
"binary_version": "4.15.0-1001.1"
},
{
"binary_name": "linux-modules-4.15.0-1001-gcp-fips",
"binary_version": "4.15.0-1001.1"
},
{
"binary_name": "linux-modules-extra-4.15.0-1001-gcp-fips",
"binary_version": "4.15.0-1001.1"
},
{
"binary_name": "linux-tools-4.15.0-1001-gcp-fips",
"binary_version": "4.15.0-1001.1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-aws-fips-headers-5.4.0-1021",
"binary_version": "5.4.0-1021.21+fips2"
},
{
"binary_name": "linux-aws-fips-tools-5.4.0-1021",
"binary_version": "5.4.0-1021.21+fips2"
},
{
"binary_name": "linux-buildinfo-5.4.0-1021-aws-fips",
"binary_version": "5.4.0-1021.21+fips2"
},
{
"binary_name": "linux-headers-5.4.0-1021-aws-fips",
"binary_version": "5.4.0-1021.21+fips2"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1021-aws-fips",
"binary_version": "5.4.0-1021.21+fips2"
},
{
"binary_name": "linux-image-unsigned-hmac-5.4.0-1021-aws-fips",
"binary_version": "5.4.0-1021.21+fips2"
},
{
"binary_name": "linux-modules-5.4.0-1021-aws-fips",
"binary_version": "5.4.0-1021.21+fips2"
},
{
"binary_name": "linux-modules-extra-5.4.0-1021-aws-fips",
"binary_version": "5.4.0-1021.21+fips2"
},
{
"binary_name": "linux-tools-5.4.0-1021-aws-fips",
"binary_version": "5.4.0-1021.21+fips2"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-azure-fips-cloud-tools-5.4.0-1022",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-azure-fips-headers-5.4.0-1022",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-azure-fips-tools-5.4.0-1022",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-buildinfo-5.4.0-1022-azure-fips",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-cloud-tools-5.4.0-1022-azure-fips",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-headers-5.4.0-1022-azure-fips",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1022-azure-fips",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.4.0-1022-azure-fips",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-modules-5.4.0-1022-azure-fips",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1022-azure-fips",
"binary_version": "5.4.0-1022.22+fips1"
},
{
"binary_name": "linux-tools-5.4.0-1022-azure-fips",
"binary_version": "5.4.0-1022.22+fips1"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1007-fips",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-fips-headers-5.4.0-1007",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-fips-tools-5.4.0-1007",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-fips-tools-host",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-headers-5.4.0-1007-fips",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1007-fips",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-image-unsigned-hmac-5.4.0-1007-fips",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-modules-5.4.0-1007-fips",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-modules-extra-5.4.0-1007-fips",
"binary_version": "5.4.0-1007.8"
},
{
"binary_name": "linux-tools-5.4.0-1007-fips",
"binary_version": "5.4.0-1007.8"
}
]
}{
"priority_reason": "The vulnerability requires physycal access or SYS_CAP_ADMIN privileges to be triggered. Moreover, it is necessary to win a race condition to exploit it.",
"binaries": [
{
"binary_name": "linux-buildinfo-5.4.0-1021-gcp-fips",
"binary_version": "5.4.0-1021.21+fips1"
},
{
"binary_name": "linux-gcp-fips-headers-5.4.0-1021",
"binary_version": "5.4.0-1021.21+fips1"
},
{
"binary_name": "linux-gcp-fips-tools-5.4.0-1021",
"binary_version": "5.4.0-1021.21+fips1"
},
{
"binary_name": "linux-headers-5.4.0-1021-gcp-fips",
"binary_version": "5.4.0-1021.21+fips1"
},
{
"binary_name": "linux-image-unsigned-5.4.0-1021-gcp-fips",
"binary_version": "5.4.0-1021.21+fips1"
},
{
"binary_name": "linux-image-unsigned-hmac-5.4.0-1021-gcp-fips",
"binary_version": "5.4.0-1021.21+fips1"
},
{
"binary_name": "linux-modules-5.4.0-1021-gcp-fips",
"binary_version": "5.4.0-1021.21+fips1"
},
{
"binary_name": "linux-modules-extra-5.4.0-1021-gcp-fips",
"binary_version": "5.4.0-1021.21+fips1"
},
{
"binary_name": "linux-tools-5.4.0-1021-gcp-fips",
"binary_version": "5.4.0-1021.21+fips1"
}
]
}