A memory leak flaw was found in nftsetcatchallflush in net/netfilter/nftables_api.c in the Linux Kernel. This issue may allow a local attacker to cause double-deactivations of catchall elements, which can result in a memory leak.
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "dasd-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-modules-5.4.0-9-snapdragon": "5.4.0-9.12", "linux-image-unsigned-5.4.0-9-snapdragon": "5.4.0-9.12", "kernel-image-5.4.0-9-generic-di": "5.4.0-9.12", "parport-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-headers-5.4.0-9-generic-lpae": "5.4.0-9.12", "md-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "linux-image-unsigned-5.4.0-9-lowlatency-dbgsym": "5.4.0-9.12", "storage-core-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-headers-5.4.0-9": "5.4.0-9.12", "ppp-modules-5.4.0-9-generic-di": "5.4.0-9.12", "plip-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "block-modules-5.4.0-9-generic-di": "5.4.0-9.12", "usb-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "vlan-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-udebs-generic": "5.4.0-9.12", "plip-modules-5.4.0-9-generic-di": "5.4.0-9.12", "nic-usb-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-modules-5.4.0-9-lowlatency": "5.4.0-9.12", "input-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "fs-core-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "ipmi-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "storage-core-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "linux-modules-extra-5.4.0-9-generic": "5.4.0-9.12", "block-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "linux-image-unsigned-5.4.0-9-generic-dbgsym": "5.4.0-9.12", "floppy-modules-5.4.0-9-generic-di": "5.4.0-9.12", "nic-shared-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "crypto-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "kernel-image-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "nic-pcmcia-modules-5.4.0-9-generic-di": "5.4.0-9.12", "virtio-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-image-5.4.0-9-generic-dbgsym": "5.4.0-9.12", "ipmi-modules-5.4.0-9-generic-di": "5.4.0-9.12", "pcmcia-storage-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-modules-5.4.0-9-generic": "5.4.0-9.12", "fb-modules-5.4.0-9-generic-di": "5.4.0-9.12", "nfs-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "linux-buildinfo-5.4.0-9-generic": "5.4.0-9.12", "linux-image-unsigned-5.4.0-9-snapdragon-dbgsym": "5.4.0-9.12", "ppp-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "linux-tools-5.4.0-9-generic": "5.4.0-9.12", "input-modules-5.4.0-9-generic-di": "5.4.0-9.12", "nic-shared-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-image-5.4.0-9-generic-lpae-dbgsym": "5.4.0-9.12", "nfs-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-headers-5.4.0-9-generic": "5.4.0-9.12", "linux-image-unsigned-5.4.0-9-lowlatency": "5.4.0-9.12", "linux-tools-5.4.0-9": "5.4.0-9.12", "crypto-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-headers-5.4.0-9-snapdragon": "5.4.0-9.12", "linux-buildinfo-5.4.0-9-lowlatency": "5.4.0-9.12", "linux-cloud-tools-common": "5.4.0-9.12", "md-modules-5.4.0-9-generic-di": "5.4.0-9.12", "serial-modules-5.4.0-9-generic-di": "5.4.0-9.12", "vlan-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "linux-libc-dev": "5.4.0-9.12", "linux-source-5.4.0": "5.4.0-9.12", "linux-tools-5.4.0-9-lowlatency": "5.4.0-9.12", "nic-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-doc": "5.4.0-9.12", "nic-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "parport-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "fat-modules-5.4.0-9-generic-di": "5.4.0-9.12", "fs-secondary-modules-5.4.0-9-generic-di": "5.4.0-9.12", "message-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-buildinfo-5.4.0-9-generic-lpae": "5.4.0-9.12", "linux-image-unsigned-5.4.0-9-generic": "5.4.0-9.12", "multipath-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "sata-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "pata-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-image-5.4.0-9-generic": "5.4.0-9.12", "linux-tools-5.4.0-9-generic-lpae": "5.4.0-9.12", "linux-cloud-tools-5.4.0-9": "5.4.0-9.12", "mouse-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-tools-5.4.0-9-snapdragon": "5.4.0-9.12", "linux-headers-5.4.0-9-lowlatency": "5.4.0-9.12", "dasd-extra-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-modules-5.4.0-9-generic-lpae": "5.4.0-9.12", "linux-tools-host": "5.4.0-9.12", "linux-cloud-tools-5.4.0-9-lowlatency": "5.4.0-9.12", "linux-buildinfo-5.4.0-9-snapdragon": "5.4.0-9.12", "linux-udebs-generic-lpae": "5.4.0-9.12", "pcmcia-modules-5.4.0-9-generic-di": "5.4.0-9.12", "nic-usb-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "multipath-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-cloud-tools-5.4.0-9-generic": "5.4.0-9.12", "sata-modules-5.4.0-9-generic-di": "5.4.0-9.12", "linux-image-5.4.0-9-generic-lpae": "5.4.0-9.12", "scsi-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "linux-tools-common": "5.4.0-9.12", "mouse-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "fs-secondary-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12", "scsi-modules-5.4.0-9-generic-di": "5.4.0-9.12", "usb-modules-5.4.0-9-generic-di": "5.4.0-9.12", "fs-core-modules-5.4.0-9-generic-di": "5.4.0-9.12", "firewire-core-modules-5.4.0-9-generic-di": "5.4.0-9.12", "fat-modules-5.4.0-9-generic-lpae-di": "5.4.0-9.12" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-aws-cloud-tools-5.4.0-1005": "5.4.0-1005.5", "linux-image-5.4.0-1005-aws-dbgsym": "5.4.0-1005.5", "linux-modules-extra-5.4.0-1005-aws": "5.4.0-1005.5", "linux-headers-5.4.0-1005-aws": "5.4.0-1005.5", "linux-modules-5.4.0-1005-aws": "5.4.0-1005.5", "linux-image-5.4.0-1005-aws": "5.4.0-1005.5", "linux-aws-tools-5.4.0-1005": "5.4.0-1005.5", "linux-tools-5.4.0-1005-aws": "5.4.0-1005.5", "linux-aws-headers-5.4.0-1005": "5.4.0-1005.5", "linux-buildinfo-5.4.0-1005-aws": "5.4.0-1005.5", "linux-cloud-tools-5.4.0-1005-aws": "5.4.0-1005.5" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-5.15.0-1045-aws": "5.15.0-1045.50~20.04.1", "linux-aws-5.15-headers-5.15.0-1045": "5.15.0-1045.50~20.04.1", "linux-aws-5.15-tools-5.15.0-1045": "5.15.0-1045.50~20.04.1", "linux-modules-5.15.0-1045-aws": "5.15.0-1045.50~20.04.1", "linux-headers-5.15.0-1045-aws": "5.15.0-1045.50~20.04.1", "linux-image-unsigned-5.15.0-1045-aws": "5.15.0-1045.50~20.04.1", "linux-modules-extra-5.15.0-1045-aws": "5.15.0-1045.50~20.04.1", "linux-image-unsigned-5.15.0-1045-aws-dbgsym": "5.15.0-1045.50~20.04.1", "linux-aws-5.15-cloud-tools-5.15.0-1045": "5.15.0-1045.50~20.04.1", "linux-cloud-tools-5.15.0-1045-aws": "5.15.0-1045.50~20.04.1", "linux-tools-5.15.0-1045-aws": "5.15.0-1045.50~20.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-azure-headers-5.4.0-1006": "5.4.0-1006.6", "linux-image-unsigned-5.4.0-1006-azure-dbgsym": "5.4.0-1006.6", "linux-cloud-tools-5.4.0-1006-azure": "5.4.0-1006.6", "linux-buildinfo-5.4.0-1006-azure": "5.4.0-1006.6", "linux-headers-5.4.0-1006-azure": "5.4.0-1006.6", "linux-azure-cloud-tools-5.4.0-1006": "5.4.0-1006.6", "linux-modules-extra-5.4.0-1006-azure": "5.4.0-1006.6", "linux-image-unsigned-5.4.0-1006-azure": "5.4.0-1006.6", "linux-azure-tools-5.4.0-1006": "5.4.0-1006.6", "linux-tools-5.4.0-1006-azure": "5.4.0-1006.6", "linux-modules-5.4.0-1006-azure": "5.4.0-1006.6" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-azure-5.15-headers-5.15.0-1047": "5.15.0-1047.54~20.04.1", "linux-image-unsigned-5.15.0-1047-azure": "5.15.0-1047.54~20.04.1", "linux-cloud-tools-5.15.0-1047-azure": "5.15.0-1047.54~20.04.1", "linux-buildinfo-5.15.0-1047-azure": "5.15.0-1047.54~20.04.1", "linux-headers-5.15.0-1047-azure": "5.15.0-1047.54~20.04.1", "linux-azure-5.15-cloud-tools-5.15.0-1047": "5.15.0-1047.54~20.04.1", "linux-azure-5.15-tools-5.15.0-1047": "5.15.0-1047.54~20.04.1", "linux-modules-5.15.0-1047-azure": "5.15.0-1047.54~20.04.1", "linux-modules-extra-5.15.0-1047-azure": "5.15.0-1047.54~20.04.1", "linux-tools-5.15.0-1047-azure": "5.15.0-1047.54~20.04.1", "linux-image-unsigned-5.15.0-1047-azure-dbgsym": "5.15.0-1047.54~20.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-unsigned-5.15.0-1047-azure-fde-dbgsym": "5.15.0-1047.54~20.04.1.1", "linux-image-unsigned-5.15.0-1047-azure-fde": "5.15.0-1047.54~20.04.1.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-modules-5.4.0-1007-bluefield": "5.4.0-1007.10", "linux-bluefield-tools-5.4.0-1007": "5.4.0-1007.10", "linux-buildinfo-5.4.0-1007-bluefield": "5.4.0-1007.10", "linux-headers-5.4.0-1007-bluefield": "5.4.0-1007.10", "linux-bluefield-headers-5.4.0-1007": "5.4.0-1007.10", "linux-image-unsigned-5.4.0-1007-bluefield": "5.4.0-1007.10", "linux-tools-5.4.0-1007-bluefield": "5.4.0-1007.10" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-5.4.0-1005-gcp": "5.4.0-1005.5", "linux-image-unsigned-5.4.0-1005-gcp": "5.4.0-1005.5", "linux-modules-5.4.0-1005-gcp": "5.4.0-1005.5", "linux-tools-5.4.0-1005-gcp": "5.4.0-1005.5", "linux-modules-extra-5.4.0-1005-gcp": "5.4.0-1005.5", "linux-gcp-headers-5.4.0-1005": "5.4.0-1005.5", "linux-image-unsigned-5.4.0-1005-gcp-dbgsym": "5.4.0-1005.5", "linux-gcp-tools-5.4.0-1005": "5.4.0-1005.5", "linux-headers-5.4.0-1005-gcp": "5.4.0-1005.5" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-5.15.0-1042-gcp": "5.15.0-1042.50~20.04.1", "linux-gcp-5.15-headers-5.15.0-1042": "5.15.0-1042.50~20.04.1", "linux-image-unsigned-5.15.0-1042-gcp": "5.15.0-1042.50~20.04.1", "linux-headers-5.15.0-1042-gcp": "5.15.0-1042.50~20.04.1", "linux-tools-5.15.0-1042-gcp": "5.15.0-1042.50~20.04.1", "linux-modules-iwlwifi-5.15.0-1042-gcp": "5.15.0-1042.50~20.04.1", "linux-modules-5.15.0-1042-gcp": "5.15.0-1042.50~20.04.1", "linux-image-unsigned-5.15.0-1042-gcp-dbgsym": "5.15.0-1042.50~20.04.1", "linux-gcp-5.15-tools-5.15.0-1042": "5.15.0-1042.50~20.04.1", "linux-modules-extra-5.15.0-1042-gcp": "5.15.0-1042.50~20.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-gkeop-tools-5.4.0-1008": "5.4.0-1008.9", "linux-cloud-tools-5.4.0-1008-gkeop": "5.4.0-1008.9", "linux-gkeop-source-5.4.0": "5.4.0-1008.9", "linux-headers-5.4.0-1008-gkeop": "5.4.0-1008.9", "linux-image-unsigned-5.4.0-1008-gkeop-dbgsym": "5.4.0-1008.9", "linux-modules-extra-5.4.0-1008-gkeop": "5.4.0-1008.9", "linux-image-unsigned-5.4.0-1008-gkeop": "5.4.0-1008.9", "linux-gkeop-headers-5.4.0-1008": "5.4.0-1008.9", "linux-gkeop-cloud-tools-5.4.0-1008": "5.4.0-1008.9", "linux-modules-5.4.0-1008-gkeop": "5.4.0-1008.9", "linux-tools-5.4.0-1008-gkeop": "5.4.0-1008.9", "linux-buildinfo-5.4.0-1008-gkeop": "5.4.0-1008.9" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-gkeop-5.15-cloud-tools-5.15.0-1028": "5.15.0-1028.33~20.04.1", "linux-gkeop-5.15-headers-5.15.0-1028": "5.15.0-1028.33~20.04.1", "linux-cloud-tools-5.15.0-1028-gkeop": "5.15.0-1028.33~20.04.1", "linux-tools-5.15.0-1028-gkeop": "5.15.0-1028.33~20.04.1", "linux-gkeop-5.15-tools-5.15.0-1028": "5.15.0-1028.33~20.04.1", "linux-image-unsigned-5.15.0-1028-gkeop-dbgsym": "5.15.0-1028.33~20.04.1", "linux-modules-extra-5.15.0-1028-gkeop": "5.15.0-1028.33~20.04.1", "linux-headers-5.15.0-1028-gkeop": "5.15.0-1028.33~20.04.1", "linux-image-unsigned-5.15.0-1028-gkeop": "5.15.0-1028.33~20.04.1", "linux-buildinfo-5.15.0-1028-gkeop": "5.15.0-1028.33~20.04.1", "linux-modules-5.15.0-1028-gkeop": "5.15.0-1028.33~20.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-tools-5.15.0-84-generic-64k": "5.15.0-84.93~20.04.1", "linux-hwe-5.15-cloud-tools-common": "5.15.0-84.93~20.04.1", "linux-hwe-5.15-headers-5.15.0-84": "5.15.0-84.93~20.04.1", "linux-image-unsigned-5.15.0-84-generic": "5.15.0-84.93~20.04.1", "linux-buildinfo-5.15.0-84-generic": "5.15.0-84.93~20.04.1", "linux-hwe-5.15-tools-common": "5.15.0-84.93~20.04.1", "linux-image-unsigned-5.15.0-84-generic-dbgsym": "5.15.0-84.93~20.04.1", "linux-hwe-5.15-source-5.15.0": "5.15.0-84.93~20.04.1", "linux-image-5.15.0-84-generic-lpae": "5.15.0-84.93~20.04.1", "linux-hwe-5.15-cloud-tools-5.15.0-84": "5.15.0-84.93~20.04.1", "linux-image-unsigned-5.15.0-84-generic-64k": "5.15.0-84.93~20.04.1", "linux-tools-5.15.0-84-generic": "5.15.0-84.93~20.04.1", "linux-image-5.15.0-84-generic-lpae-dbgsym": "5.15.0-84.93~20.04.1", "linux-image-5.15.0-84-generic": "5.15.0-84.93~20.04.1", "linux-headers-5.15.0-84-generic-64k": "5.15.0-84.93~20.04.1", "linux-image-5.15.0-84-generic-dbgsym": "5.15.0-84.93~20.04.1", "linux-modules-iwlwifi-5.15.0-84-generic": "5.15.0-84.93~20.04.1", "linux-modules-extra-5.15.0-84-generic": "5.15.0-84.93~20.04.1", "linux-tools-5.15.0-84-generic-lpae": "5.15.0-84.93~20.04.1", "linux-hwe-5.15-tools-5.15.0-84": "5.15.0-84.93~20.04.1", "linux-image-unsigned-5.15.0-84-generic-64k-dbgsym": "5.15.0-84.93~20.04.1", "linux-cloud-tools-5.15.0-84-generic": "5.15.0-84.93~20.04.1", "linux-modules-5.15.0-84-generic-lpae": "5.15.0-84.93~20.04.1", "linux-headers-5.15.0-84-generic-lpae": "5.15.0-84.93~20.04.1", "linux-buildinfo-5.15.0-84-generic-lpae": "5.15.0-84.93~20.04.1", "linux-headers-5.15.0-84-generic": "5.15.0-84.93~20.04.1", "linux-buildinfo-5.15.0-84-generic-64k": "5.15.0-84.93~20.04.1", "linux-modules-5.15.0-84-generic-64k": "5.15.0-84.93~20.04.1", "linux-modules-5.15.0-84-generic": "5.15.0-84.93~20.04.1", "linux-hwe-5.15-tools-host": "5.15.0-84.93~20.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-ibm-cloud-tools-common": "5.4.0-1003.4", "linux-ibm-tools-common": "5.4.0-1003.4", "linux-ibm-headers-5.4.0-1003": "5.4.0-1003.4", "linux-ibm-tools-5.4.0-1003": "5.4.0-1003.4", "linux-image-unsigned-5.4.0-1003-ibm": "5.4.0-1003.4", "linux-tools-5.4.0-1003-ibm": "5.4.0-1003.4", "linux-modules-5.4.0-1003-ibm": "5.4.0-1003.4", "linux-headers-5.4.0-1003-ibm": "5.4.0-1003.4", "linux-ibm-source-5.4.0": "5.4.0-1003.4", "linux-image-unsigned-5.4.0-1003-ibm-dbgsym": "5.4.0-1003.4", "linux-modules-extra-5.4.0-1003-ibm": "5.4.0-1003.4", "linux-buildinfo-5.4.0-1003-ibm": "5.4.0-1003.4" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-headers-5.15.0-1038-ibm": "5.15.0-1038.41~20.04.1", "linux-ibm-5.15-tools-5.15.0-1038": "5.15.0-1038.41~20.04.1", "linux-image-unsigned-5.15.0-1038-ibm-dbgsym": "5.15.0-1038.41~20.04.1", "linux-modules-extra-5.15.0-1038-ibm": "5.15.0-1038.41~20.04.1", "linux-ibm-5.15-headers-5.15.0-1038": "5.15.0-1038.41~20.04.1", "linux-ibm-5.15-source-5.15.0": "5.15.0-1038.41~20.04.1", "linux-image-unsigned-5.15.0-1038-ibm": "5.15.0-1038.41~20.04.1", "linux-buildinfo-5.15.0-1038-ibm": "5.15.0-1038.41~20.04.1", "linux-tools-5.15.0-1038-ibm": "5.15.0-1038.41~20.04.1", "linux-modules-5.15.0-1038-ibm": "5.15.0-1038.41~20.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-intel-iotg-5.15-tools-host": "5.15.0-1040.46~20.04.1", "linux-intel-iotg-5.15-tools-common": "5.15.0-1040.46~20.04.1", "linux-modules-extra-5.15.0-1040-intel-iotg": "5.15.0-1040.46~20.04.1", "linux-modules-5.15.0-1040-intel-iotg": "5.15.0-1040.46~20.04.1", "linux-cloud-tools-5.15.0-1040-intel-iotg": "5.15.0-1040.46~20.04.1", "linux-image-unsigned-5.15.0-1040-intel-iotg-dbgsym": "5.15.0-1040.46~20.04.1", "linux-intel-iotg-5.15-tools-5.15.0-1040": "5.15.0-1040.46~20.04.1", "linux-intel-iotg-5.15-cloud-tools-5.15.0-1040": "5.15.0-1040.46~20.04.1", "linux-image-unsigned-5.15.0-1040-intel-iotg": "5.15.0-1040.46~20.04.1", "linux-modules-iwlwifi-5.15.0-1040-intel-iotg": "5.15.0-1040.46~20.04.1", "linux-intel-iotg-5.15-cloud-tools-common": "5.15.0-1040.46~20.04.1", "linux-intel-iotg-5.15-headers-5.15.0-1040": "5.15.0-1040.46~20.04.1", "linux-buildinfo-5.15.0-1040-intel-iotg": "5.15.0-1040.46~20.04.1", "linux-tools-5.15.0-1040-intel-iotg": "5.15.0-1040.46~20.04.1", "linux-headers-5.15.0-1040-intel-iotg": "5.15.0-1040.46~20.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-modules-5.4.0-1001-iot": "5.4.0-1001.3", "linux-iot-tools-5.4.0-1001": "5.4.0-1001.3", "linux-iot-headers-5.4.0-1001": "5.4.0-1001.3", "linux-iot-tools-common": "5.4.0-1001.3", "linux-tools-5.4.0-1001-iot": "5.4.0-1001.3", "linux-buildinfo-5.4.0-1001-iot": "5.4.0-1001.3", "linux-image-unsigned-5.4.0-1001-iot": "5.4.0-1001.3", "linux-headers-5.4.0-1001-iot": "5.4.0-1001.3", "linux-image-unsigned-5.4.0-1001-iot-dbgsym": "5.4.0-1001.3" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-5.4.0-1004-kvm": "5.4.0-1004.4", "linux-buildinfo-5.4.0-1004-kvm": "5.4.0-1004.4", "linux-headers-5.4.0-1004-kvm": "5.4.0-1004.4", "linux-image-5.4.0-1004-kvm-dbgsym": "5.4.0-1004.4", "linux-kvm-tools-5.4.0-1004": "5.4.0-1004.4", "linux-kvm-headers-5.4.0-1004": "5.4.0-1004.4", "linux-tools-5.4.0-1004-kvm": "5.4.0-1004.4", "linux-modules-5.4.0-1004-kvm": "5.4.0-1004.4" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-lowlatency-hwe-5.15-tools-5.15.0-84": "5.15.0-84.93~20.04.1", "linux-buildinfo-5.15.0-84-lowlatency-64k": "5.15.0-84.93~20.04.1", "linux-lowlatency-hwe-5.15-headers-5.15.0-84": "5.15.0-84.93~20.04.1", "linux-tools-5.15.0-84-lowlatency": "5.15.0-84.93~20.04.1", "linux-modules-5.15.0-84-lowlatency": "5.15.0-84.93~20.04.1", "linux-tools-5.15.0-84-lowlatency-64k": "5.15.0-84.93~20.04.1", "linux-headers-5.15.0-84-lowlatency": "5.15.0-84.93~20.04.1", "linux-image-unsigned-5.15.0-84-lowlatency-64k-dbgsym": "5.15.0-84.93~20.04.1", "linux-lowlatency-hwe-5.15-cloud-tools-common": "5.15.0-84.93~20.04.1", "linux-image-unsigned-5.15.0-84-lowlatency-dbgsym": "5.15.0-84.93~20.04.1", "linux-lowlatency-hwe-5.15-tools-common": "5.15.0-84.93~20.04.1", "linux-cloud-tools-5.15.0-84-lowlatency": "5.15.0-84.93~20.04.1", "linux-modules-iwlwifi-5.15.0-84-lowlatency": "5.15.0-84.93~20.04.1", "linux-lowlatency-hwe-5.15-tools-host": "5.15.0-84.93~20.04.1", "linux-headers-5.15.0-84-lowlatency-64k": "5.15.0-84.93~20.04.1", "linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-84": "5.15.0-84.93~20.04.1", "linux-buildinfo-5.15.0-84-lowlatency": "5.15.0-84.93~20.04.1", "linux-image-unsigned-5.15.0-84-lowlatency-64k": "5.15.0-84.93~20.04.1", "linux-image-unsigned-5.15.0-84-lowlatency": "5.15.0-84.93~20.04.1", "linux-modules-5.15.0-84-lowlatency-64k": "5.15.0-84.93~20.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-5.4.0-1005-oracle": "5.4.0-1005.5", "linux-headers-5.4.0-1005-oracle": "5.4.0-1005.5", "linux-image-unsigned-5.4.0-1005-oracle-dbgsym": "5.4.0-1005.5", "linux-oracle-tools-5.4.0-1005": "5.4.0-1005.5", "linux-modules-extra-5.4.0-1005-oracle": "5.4.0-1005.5", "linux-oracle-headers-5.4.0-1005": "5.4.0-1005.5", "linux-modules-5.4.0-1005-oracle": "5.4.0-1005.5", "linux-tools-5.4.0-1005-oracle": "5.4.0-1005.5", "linux-image-unsigned-5.4.0-1005-oracle": "5.4.0-1005.5" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-oracle-5.15-tools-5.15.0-1044": "5.15.0-1044.50~20.04.1", "linux-buildinfo-5.15.0-1044-oracle": "5.15.0-1044.50~20.04.1", "linux-oracle-5.15-headers-5.15.0-1044": "5.15.0-1044.50~20.04.1", "linux-modules-5.15.0-1044-oracle": "5.15.0-1044.50~20.04.1", "linux-tools-5.15.0-1044-oracle": "5.15.0-1044.50~20.04.1", "linux-modules-extra-5.15.0-1044-oracle": "5.15.0-1044.50~20.04.1", "linux-headers-5.15.0-1044-oracle": "5.15.0-1044.50~20.04.1", "linux-image-unsigned-5.15.0-1044-oracle-dbgsym": "5.15.0-1044.50~20.04.1", "linux-image-unsigned-5.15.0-1044-oracle": "5.15.0-1044.50~20.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-5.4.0-1007-raspi": "5.4.0-1007.7", "linux-headers-5.4.0-1007-raspi": "5.4.0-1007.7", "linux-raspi-headers-5.4.0-1007": "5.4.0-1007.7", "linux-tools-5.4.0-1007-raspi": "5.4.0-1007.7", "linux-image-5.4.0-1007-raspi": "5.4.0-1007.7", "linux-modules-5.4.0-1007-raspi": "5.4.0-1007.7", "linux-image-5.4.0-1007-raspi-dbgsym": "5.4.0-1007.7", "linux-raspi-tools-5.4.0-1007": "5.4.0-1007.7" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-modules-5.15.0-1041-generic": "5.15.0-1041.45~20.04.1", "linux-tools-5.15.0-1041-generic": "5.15.0-1041.45~20.04.1", "linux-headers-5.15.0-1041-generic": "5.15.0-1041.45~20.04.1", "linux-image-5.15.0-1041-generic": "5.15.0-1041.45~20.04.1", "linux-modules-extra-5.15.0-1041-generic": "5.15.0-1041.45~20.04.1", "linux-buildinfo-5.15.0-1041-generic": "5.15.0-1041.45~20.04.1", "linux-image-5.15.0-1041-generic-dbgsym": "5.15.0-1041.45~20.04.1", "linux-riscv-5.15-headers-5.15.0-1041": "5.15.0-1041.45~20.04.1", "linux-riscv-5.15-tools-5.15.0-1041": "5.15.0-1041.45~20.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-modules-5.4.0-1020-xilinx-zynqmp": "5.4.0-1020.24", "linux-image-5.4.0-1020-xilinx-zynqmp": "5.4.0-1020.24", "linux-xilinx-zynqmp-headers-5.4.0-1020": "5.4.0-1020.24", "linux-xilinx-zynqmp-tools-5.4.0-1020": "5.4.0-1020.24", "linux-image-5.4.0-1020-xilinx-zynqmp-dbgsym": "5.4.0-1020.24", "linux-tools-5.4.0-1020-xilinx-zynqmp": "5.4.0-1020.24", "linux-buildinfo-5.4.0-1020-xilinx-zynqmp": "5.4.0-1020.24", "linux-headers-5.4.0-1020-xilinx-zynqmp": "5.4.0-1020.24" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-tools-5.15.0-84-generic-64k": "5.15.0-84.93", "linux-cloud-tools-common": "5.15.0-84.93", "linux-image-unsigned-5.15.0-84-generic": "5.15.0-84.93", "linux-libc-dev": "5.15.0-84.93", "linux-buildinfo-5.15.0-84-generic": "5.15.0-84.93", "linux-doc": "5.15.0-84.93", "linux-image-unsigned-5.15.0-84-generic-dbgsym": "5.15.0-84.93", "linux-image-5.15.0-84-generic-lpae": "5.15.0-84.93", "linux-source-5.15.0": "5.15.0-84.93", "linux-image-unsigned-5.15.0-84-generic-64k": "5.15.0-84.93", "linux-tools-5.15.0-84-generic": "5.15.0-84.93", "linux-image-5.15.0-84-generic-lpae-dbgsym": "5.15.0-84.93", "linux-image-5.15.0-84-generic": "5.15.0-84.93", "linux-headers-5.15.0-84-generic-64k": "5.15.0-84.93", "linux-image-5.15.0-84-generic-dbgsym": "5.15.0-84.93", "linux-modules-iwlwifi-5.15.0-84-generic": "5.15.0-84.93", "linux-tools-host": "5.15.0-84.93", "linux-tools-5.15.0-84": "5.15.0-84.93", "linux-tools-5.15.0-84-generic-lpae": "5.15.0-84.93", "linux-cloud-tools-5.15.0-84": "5.15.0-84.93", "linux-modules-extra-5.15.0-84-generic": "5.15.0-84.93", "linux-image-unsigned-5.15.0-84-generic-64k-dbgsym": "5.15.0-84.93", "linux-cloud-tools-5.15.0-84-generic": "5.15.0-84.93", "linux-modules-5.15.0-84-generic-lpae": "5.15.0-84.93", "linux-headers-5.15.0-84-generic-lpae": "5.15.0-84.93", "linux-buildinfo-5.15.0-84-generic-lpae": "5.15.0-84.93", "linux-headers-5.15.0-84-generic": "5.15.0-84.93", "linux-buildinfo-5.15.0-84-generic-64k": "5.15.0-84.93", "linux-tools-common": "5.15.0-84.93", "linux-headers-5.15.0-84": "5.15.0-84.93", "linux-modules-5.15.0-84-generic-64k": "5.15.0-84.93", "linux-modules-5.15.0-84-generic": "5.15.0-84.93" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-5.15.0-1045-aws": "5.15.0-1045.50", "linux-modules-5.15.0-1045-aws": "5.15.0-1045.50", "linux-modules-extra-5.15.0-1045-aws": "5.15.0-1045.50", "linux-image-unsigned-5.15.0-1045-aws": "5.15.0-1045.50", "linux-headers-5.15.0-1045-aws": "5.15.0-1045.50", "linux-aws-tools-5.15.0-1045": "5.15.0-1045.50", "linux-image-unsigned-5.15.0-1045-aws-dbgsym": "5.15.0-1045.50", "linux-aws-cloud-tools-5.15.0-1045": "5.15.0-1045.50", "linux-cloud-tools-5.15.0-1045-aws": "5.15.0-1045.50", "linux-aws-headers-5.15.0-1045": "5.15.0-1045.50", "linux-tools-5.15.0-1045-aws": "5.15.0-1045.50" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-aws-6.2-headers-6.2.0-1012": "6.2.0-1012.12~22.04.1", "linux-cloud-tools-6.2.0-1012-aws": "6.2.0-1012.12~22.04.1", "linux-aws-6.2-tools-6.2.0-1012": "6.2.0-1012.12~22.04.1", "linux-image-unsigned-6.2.0-1012-aws-dbgsym": "6.2.0-1012.12~22.04.1", "linux-modules-6.2.0-1012-aws": "6.2.0-1012.12~22.04.1", "linux-buildinfo-6.2.0-1012-aws": "6.2.0-1012.12~22.04.1", "linux-image-unsigned-6.2.0-1012-aws": "6.2.0-1012.12~22.04.1", "linux-headers-6.2.0-1012-aws": "6.2.0-1012.12~22.04.1", "linux-tools-6.2.0-1012-aws": "6.2.0-1012.12~22.04.1", "linux-aws-6.2-cloud-tools-6.2.0-1012": "6.2.0-1012.12~22.04.1", "linux-modules-extra-6.2.0-1012-aws": "6.2.0-1012.12~22.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-aws-6.5-tools-6.5.0-1008": "6.5.0-1008.8~22.04.1", "linux-modules-6.5.0-1008-aws": "6.5.0-1008.8~22.04.1", "linux-aws-6.5-headers-6.5.0-1008": "6.5.0-1008.8~22.04.1", "linux-image-unsigned-6.5.0-1008-aws-dbgsym": "6.5.0-1008.8~22.04.1", "linux-buildinfo-6.5.0-1008-aws": "6.5.0-1008.8~22.04.1", "linux-aws-6.5-cloud-tools-6.5.0-1008": "6.5.0-1008.8~22.04.1", "linux-modules-extra-6.5.0-1008-aws": "6.5.0-1008.8~22.04.1", "linux-tools-6.5.0-1008-aws": "6.5.0-1008.8~22.04.1", "linux-headers-6.5.0-1008-aws": "6.5.0-1008.8~22.04.1", "linux-image-unsigned-6.5.0-1008-aws": "6.5.0-1008.8~22.04.1", "linux-cloud-tools-6.5.0-1008-aws": "6.5.0-1008.8~22.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-azure-cloud-tools-5.15.0-1047": "5.15.0-1047.54", "linux-image-unsigned-5.15.0-1047-azure": "5.15.0-1047.54", "linux-azure-tools-5.15.0-1047": "5.15.0-1047.54", "linux-tools-5.15.0-1047-azure": "5.15.0-1047.54", "linux-cloud-tools-5.15.0-1047-azure": "5.15.0-1047.54", "linux-buildinfo-5.15.0-1047-azure": "5.15.0-1047.54", "linux-headers-5.15.0-1047-azure": "5.15.0-1047.54", "linux-modules-5.15.0-1047-azure": "5.15.0-1047.54", "linux-modules-extra-5.15.0-1047-azure": "5.15.0-1047.54", "linux-azure-headers-5.15.0-1047": "5.15.0-1047.54", "linux-image-unsigned-5.15.0-1047-azure-dbgsym": "5.15.0-1047.54" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-6.2.0-1012-azure": "6.2.0-1012.12~22.04.1", "linux-headers-6.2.0-1012-azure": "6.2.0-1012.12~22.04.1", "linux-tools-6.2.0-1012-azure": "6.2.0-1012.12~22.04.1", "linux-modules-6.2.0-1012-azure": "6.2.0-1012.12~22.04.1", "linux-cloud-tools-6.2.0-1012-azure": "6.2.0-1012.12~22.04.1", "linux-azure-6.2-headers-6.2.0-1012": "6.2.0-1012.12~22.04.1", "linux-azure-6.2-tools-6.2.0-1012": "6.2.0-1012.12~22.04.1", "linux-azure-6.2-cloud-tools-6.2.0-1012": "6.2.0-1012.12~22.04.1", "linux-image-unsigned-6.2.0-1012-azure": "6.2.0-1012.12~22.04.1", "linux-modules-extra-6.2.0-1012-azure": "6.2.0-1012.12~22.04.1", "linux-image-unsigned-6.2.0-1012-azure-dbgsym": "6.2.0-1012.12~22.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-azure-6.5-cloud-tools-6.5.0-1007": "6.5.0-1007.7~22.04.1", "linux-headers-6.5.0-1007-azure": "6.5.0-1007.7~22.04.1", "linux-modules-6.5.0-1007-azure": "6.5.0-1007.7~22.04.1", "linux-tools-6.5.0-1007-azure": "6.5.0-1007.7~22.04.1", "linux-modules-iwlwifi-6.5.0-1007-azure": "6.5.0-1007.7~22.04.1", "linux-image-unsigned-6.5.0-1007-azure": "6.5.0-1007.7~22.04.1", "linux-azure-6.5-headers-6.5.0-1007": "6.5.0-1007.7~22.04.1", "linux-azure-6.5-tools-6.5.0-1007": "6.5.0-1007.7~22.04.1", "linux-image-unsigned-6.5.0-1007-azure-dbgsym": "6.5.0-1007.7~22.04.1", "linux-cloud-tools-6.5.0-1007-azure": "6.5.0-1007.7~22.04.1", "linux-modules-extra-6.5.0-1007-azure": "6.5.0-1007.7~22.04.1", "linux-buildinfo-6.5.0-1007-azure": "6.5.0-1007.7~22.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-unsigned-5.15.0-1047-azure-fde-dbgsym": "5.15.0-1047.54.1", "linux-image-unsigned-5.15.0-1047-azure-fde": "5.15.0-1047.54.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-5.15.0-1042-gcp": "5.15.0-1042.50", "linux-image-unsigned-5.15.0-1042-gcp": "5.15.0-1042.50", "linux-headers-5.15.0-1042-gcp": "5.15.0-1042.50", "linux-tools-5.15.0-1042-gcp": "5.15.0-1042.50", "linux-modules-iwlwifi-5.15.0-1042-gcp": "5.15.0-1042.50", "linux-gcp-tools-5.15.0-1042": "5.15.0-1042.50", "linux-modules-5.15.0-1042-gcp": "5.15.0-1042.50", "linux-image-unsigned-5.15.0-1042-gcp-dbgsym": "5.15.0-1042.50", "linux-gcp-headers-5.15.0-1042": "5.15.0-1042.50", "linux-modules-extra-5.15.0-1042-gcp": "5.15.0-1042.50" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-gcp-6.2-tools-6.2.0-1014": "6.2.0-1014.14~22.04.1", "linux-image-unsigned-6.2.0-1014-gcp-dbgsym": "6.2.0-1014.14~22.04.1", "linux-modules-6.2.0-1014-gcp": "6.2.0-1014.14~22.04.1", "linux-headers-6.2.0-1014-gcp": "6.2.0-1014.14~22.04.1", "linux-gcp-6.2-headers-6.2.0-1014": "6.2.0-1014.14~22.04.1", "linux-image-unsigned-6.2.0-1014-gcp": "6.2.0-1014.14~22.04.1", "linux-tools-6.2.0-1014-gcp": "6.2.0-1014.14~22.04.1", "linux-modules-iwlwifi-6.2.0-1014-gcp": "6.2.0-1014.14~22.04.1", "linux-buildinfo-6.2.0-1014-gcp": "6.2.0-1014.14~22.04.1", "linux-modules-extra-6.2.0-1014-gcp": "6.2.0-1014.14~22.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-gcp-6.5-headers-6.5.0-1010": "6.5.0-1010.10~22.04.3", "linux-modules-iwlwifi-6.5.0-1010-gcp": "6.5.0-1010.10~22.04.3", "linux-modules-6.5.0-1010-gcp": "6.5.0-1010.10~22.04.3", "linux-tools-6.5.0-1010-gcp": "6.5.0-1010.10~22.04.3", "linux-image-unsigned-6.5.0-1010-gcp-dbgsym": "6.5.0-1010.10~22.04.3", "linux-image-unsigned-6.5.0-1010-gcp": "6.5.0-1010.10~22.04.3", "linux-buildinfo-6.5.0-1010-gcp": "6.5.0-1010.10~22.04.3", "linux-headers-6.5.0-1010-gcp": "6.5.0-1010.10~22.04.3", "linux-gcp-6.5-tools-6.5.0-1010": "6.5.0-1010.10~22.04.3", "linux-modules-extra-6.5.0-1010-gcp": "6.5.0-1010.10~22.04.3" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-modules-iwlwifi-5.15.0-1042-gke": "5.15.0-1042.47", "linux-headers-5.15.0-1042-gke": "5.15.0-1042.47", "linux-modules-extra-5.15.0-1042-gke": "5.15.0-1042.47", "linux-image-unsigned-5.15.0-1042-gke": "5.15.0-1042.47", "linux-buildinfo-5.15.0-1042-gke": "5.15.0-1042.47", "linux-modules-5.15.0-1042-gke": "5.15.0-1042.47", "linux-image-unsigned-5.15.0-1042-gke-dbgsym": "5.15.0-1042.47", "linux-gke-tools-5.15.0-1042": "5.15.0-1042.47", "linux-tools-5.15.0-1042-gke": "5.15.0-1042.47", "linux-gke-headers-5.15.0-1042": "5.15.0-1042.47" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-unsigned-5.15.0-1028-gkeop-dbgsym": "5.15.0-1028.33", "linux-modules-extra-5.15.0-1028-gkeop": "5.15.0-1028.33", "linux-cloud-tools-5.15.0-1028-gkeop": "5.15.0-1028.33", "linux-gkeop-cloud-tools-5.15.0-1028": "5.15.0-1028.33", "linux-gkeop-tools-5.15.0-1028": "5.15.0-1028.33", "linux-tools-5.15.0-1028-gkeop": "5.15.0-1028.33", "linux-gkeop-headers-5.15.0-1028": "5.15.0-1028.33", "linux-headers-5.15.0-1028-gkeop": "5.15.0-1028.33", "linux-image-unsigned-5.15.0-1028-gkeop": "5.15.0-1028.33", "linux-buildinfo-5.15.0-1028-gkeop": "5.15.0-1028.33", "linux-modules-5.15.0-1028-gkeop": "5.15.0-1028.33" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-6.2.0-33-generic": "6.2.0-33.33~22.04.1", "linux-image-6.2.0-33-generic-lpae": "6.2.0-33.33~22.04.1", "linux-hwe-6.2-cloud-tools-6.2.0-33": "6.2.0-33.33~22.04.1", "linux-modules-6.2.0-33-generic": "6.2.0-33.33~22.04.1", "linux-source-6.2.0": "6.2.0-33.33~22.04.1", "linux-modules-ivsc-6.2.0-33-generic": "6.2.0-33.33~22.04.1", "linux-hwe-6.2-headers-6.2.0-33": "6.2.0-33.33~22.04.1", "linux-image-6.2.0-33-generic": "6.2.0-33.33~22.04.1", "linux-modules-6.2.0-33-generic-64k": "6.2.0-33.33~22.04.1", "linux-image-6.2.0-33-generic-lpae-dbgsym": "6.2.0-33.33~22.04.1", "linux-image-unsigned-6.2.0-33-generic-64k-dbgsym": "6.2.0-33.33~22.04.1", "linux-headers-6.2.0-33-generic": "6.2.0-33.33~22.04.1", "linux-modules-ipu6-6.2.0-33-generic": "6.2.0-33.33~22.04.1", "linux-tools-6.2.0-33-generic-lpae": "6.2.0-33.33~22.04.1", "linux-image-unsigned-6.2.0-33-generic-64k": "6.2.0-33.33~22.04.1", "linux-hwe-6.2-tools-host": "6.2.0-33.33~22.04.1", "linux-image-unsigned-6.2.0-33-generic-dbgsym": "6.2.0-33.33~22.04.1", "linux-modules-extra-6.2.0-33-generic": "6.2.0-33.33~22.04.1", "linux-hwe-6.2-tools-common": "6.2.0-33.33~22.04.1", "linux-tools-6.2.0-33-generic-64k": "6.2.0-33.33~22.04.1", "linux-headers-6.2.0-33-generic-64k": "6.2.0-33.33~22.04.1", "linux-buildinfo-6.2.0-33-generic-lpae": "6.2.0-33.33~22.04.1", "linux-modules-iwlwifi-6.2.0-33-generic": "6.2.0-33.33~22.04.1", "linux-image-6.2.0-33-generic-dbgsym": "6.2.0-33.33~22.04.1", "linux-buildinfo-6.2.0-33-generic-64k": "6.2.0-33.33~22.04.1", "linux-hwe-6.2-tools-6.2.0-33": "6.2.0-33.33~22.04.1", "linux-headers-6.2.0-33-generic-lpae": "6.2.0-33.33~22.04.1", "linux-image-unsigned-6.2.0-33-generic": "6.2.0-33.33~22.04.1", "linux-hwe-6.2-cloud-tools-common": "6.2.0-33.33~22.04.1", "linux-tools-6.2.0-33-generic": "6.2.0-33.33~22.04.1", "linux-modules-6.2.0-33-generic-lpae": "6.2.0-33.33~22.04.1", "linux-cloud-tools-6.2.0-33-generic": "6.2.0-33.33~22.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-tools-6.5.0-14-generic": "6.5.0-14.14~22.04.1", "linux-image-unsigned-6.5.0-14-generic-64k-dbgsym": "6.5.0-14.14~22.04.1", "linux-image-6.5.0-14-generic": "6.5.0-14.14~22.04.1", "linux-modules-ivsc-6.5.0-14-generic": "6.5.0-14.14~22.04.1", "linux-headers-6.5.0-14-generic-64k": "6.5.0-14.14~22.04.1", "linux-hwe-6.5-headers-6.5.0-14": "6.5.0-14.14~22.04.1", "linux-headers-6.5.0-14-generic": "6.5.0-14.14~22.04.1", "linux-modules-extra-6.5.0-14-generic": "6.5.0-14.14~22.04.1", "linux-hwe-6.5-tools-6.5.0-14": "6.5.0-14.14~22.04.1", "linux-hwe-6.5-tools-host": "6.5.0-14.14~22.04.1", "linux-source-6.5.0": "6.5.0-14.14~22.04.1", "linux-buildinfo-6.5.0-14-generic-64k": "6.5.0-14.14~22.04.1", "linux-modules-iwlwifi-6.5.0-14-generic": "6.5.0-14.14~22.04.1", "linux-image-unsigned-6.5.0-14-generic-dbgsym": "6.5.0-14.14~22.04.1", "linux-hwe-6.5-tools-common": "6.5.0-14.14~22.04.1", "linux-hwe-6.5-cloud-tools-common": "6.5.0-14.14~22.04.1", "linux-modules-6.5.0-14-generic-64k": "6.5.0-14.14~22.04.1", "linux-image-unsigned-6.5.0-14-generic-64k": "6.5.0-14.14~22.04.1", "linux-cloud-tools-6.5.0-14-generic": "6.5.0-14.14~22.04.1", "linux-buildinfo-6.5.0-14-generic": "6.5.0-14.14~22.04.1", "linux-hwe-6.5-cloud-tools-6.5.0-14": "6.5.0-14.14~22.04.1", "linux-image-unsigned-6.5.0-14-generic": "6.5.0-14.14~22.04.1", "linux-modules-6.5.0-14-generic": "6.5.0-14.14~22.04.1", "linux-image-6.5.0-14-generic-dbgsym": "6.5.0-14.14~22.04.1", "linux-modules-ipu6-6.5.0-14-generic": "6.5.0-14.14~22.04.1", "linux-tools-6.5.0-14-generic-64k": "6.5.0-14.14~22.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-headers-5.15.0-1038-ibm": "5.15.0-1038.41", "linux-ibm-tools-common": "5.15.0-1038.41", "linux-ibm-headers-5.15.0-1038": "5.15.0-1038.41", "linux-ibm-source-5.15.0": "5.15.0-1038.41", "linux-modules-extra-5.15.0-1038-ibm": "5.15.0-1038.41", "linux-ibm-tools-5.15.0-1038": "5.15.0-1038.41", "linux-image-unsigned-5.15.0-1038-ibm-dbgsym": "5.15.0-1038.41", "linux-image-unsigned-5.15.0-1038-ibm": "5.15.0-1038.41", "linux-buildinfo-5.15.0-1038-ibm": "5.15.0-1038.41", "linux-ibm-cloud-tools-common": "5.15.0-1038.41", "linux-modules-5.15.0-1038-ibm": "5.15.0-1038.41", "linux-tools-5.15.0-1038-ibm": "5.15.0-1038.41" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-intel-iotg-cloud-tools-5.15.0-1040": "5.15.0-1040.46", "linux-modules-extra-5.15.0-1040-intel-iotg": "5.15.0-1040.46", "linux-modules-5.15.0-1040-intel-iotg": "5.15.0-1040.46", "linux-cloud-tools-5.15.0-1040-intel-iotg": "5.15.0-1040.46", "linux-image-unsigned-5.15.0-1040-intel-iotg-dbgsym": "5.15.0-1040.46", "linux-intel-iotg-tools-host": "5.15.0-1040.46", "linux-intel-iotg-headers-5.15.0-1040": "5.15.0-1040.46", "linux-intel-iotg-cloud-tools-common": "5.15.0-1040.46", "linux-image-unsigned-5.15.0-1040-intel-iotg": "5.15.0-1040.46", "linux-intel-iotg-tools-5.15.0-1040": "5.15.0-1040.46", "linux-intel-iotg-tools-common": "5.15.0-1040.46", "linux-modules-iwlwifi-5.15.0-1040-intel-iotg": "5.15.0-1040.46", "linux-buildinfo-5.15.0-1040-intel-iotg": "5.15.0-1040.46", "linux-headers-5.15.0-1040-intel-iotg": "5.15.0-1040.46", "linux-tools-5.15.0-1040-intel-iotg": "5.15.0-1040.46" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-unsigned-5.15.0-1042-kvm-dbgsym": "5.15.0-1042.47", "linux-kvm-tools-5.15.0-1042": "5.15.0-1042.47", "linux-modules-5.15.0-1042-kvm": "5.15.0-1042.47", "linux-tools-5.15.0-1042-kvm": "5.15.0-1042.47", "linux-image-unsigned-5.15.0-1042-kvm": "5.15.0-1042.47", "linux-buildinfo-5.15.0-1042-kvm": "5.15.0-1042.47", "linux-kvm-headers-5.15.0-1042": "5.15.0-1042.47", "linux-headers-5.15.0-1042-kvm": "5.15.0-1042.47" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-lowlatency-cloud-tools-5.15.0-84": "5.15.0-84.93", "linux-lowlatency-headers-5.15.0-84": "5.15.0-84.93", "linux-buildinfo-5.15.0-84-lowlatency-64k": "5.15.0-84.93", "linux-lowlatency-tools-5.15.0-84": "5.15.0-84.93", "linux-lowlatency-tools-common": "5.15.0-84.93", "linux-tools-5.15.0-84-lowlatency": "5.15.0-84.93", "linux-lowlatency-tools-host": "5.15.0-84.93", "linux-modules-5.15.0-84-lowlatency": "5.15.0-84.93", "linux-tools-5.15.0-84-lowlatency-64k": "5.15.0-84.93", "linux-lowlatency-cloud-tools-common": "5.15.0-84.93", "linux-headers-5.15.0-84-lowlatency": "5.15.0-84.93", "linux-image-unsigned-5.15.0-84-lowlatency-64k-dbgsym": "5.15.0-84.93", "linux-image-unsigned-5.15.0-84-lowlatency-dbgsym": "5.15.0-84.93", "linux-cloud-tools-5.15.0-84-lowlatency": "5.15.0-84.93", "linux-modules-iwlwifi-5.15.0-84-lowlatency": "5.15.0-84.93", "linux-headers-5.15.0-84-lowlatency-64k": "5.15.0-84.93", "linux-buildinfo-5.15.0-84-lowlatency": "5.15.0-84.93", "linux-image-unsigned-5.15.0-84-lowlatency-64k": "5.15.0-84.93", "linux-image-unsigned-5.15.0-84-lowlatency": "5.15.0-84.93", "linux-modules-5.15.0-84-lowlatency-64k": "5.15.0-84.93" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-lowlatency-hwe-6.2-cloud-tools-common": "6.2.0-1013.13~22.04.1", "linux-lowlatency-hwe-6.2-tools-common": "6.2.0-1013.13~22.04.1", "linux-lowlatency-hwe-6.2-headers-6.2.0-1013": "6.2.0-1013.13~22.04.1", "linux-buildinfo-6.2.0-1013-lowlatency-64k": "6.2.0-1013.13~22.04.1", "linux-buildinfo-6.2.0-1013-lowlatency": "6.2.0-1013.13~22.04.1", "linux-image-unsigned-6.2.0-1013-lowlatency": "6.2.0-1013.13~22.04.1", "linux-image-unsigned-6.2.0-1013-lowlatency-64k-dbgsym": "6.2.0-1013.13~22.04.1", "linux-modules-6.2.0-1013-lowlatency-64k": "6.2.0-1013.13~22.04.1", "linux-tools-6.2.0-1013-lowlatency": "6.2.0-1013.13~22.04.1", "linux-modules-iwlwifi-6.2.0-1013-lowlatency": "6.2.0-1013.13~22.04.1", "linux-cloud-tools-6.2.0-1013-lowlatency": "6.2.0-1013.13~22.04.1", "linux-headers-6.2.0-1013-lowlatency": "6.2.0-1013.13~22.04.1", "linux-lowlatency-hwe-6.2-cloud-tools-6.2.0-1013": "6.2.0-1013.13~22.04.1", "linux-tools-6.2.0-1013-lowlatency-64k": "6.2.0-1013.13~22.04.1", "linux-modules-ipu6-6.2.0-1013-lowlatency": "6.2.0-1013.13~22.04.1", "linux-lowlatency-hwe-6.2-tools-6.2.0-1013": "6.2.0-1013.13~22.04.1", "linux-modules-ivsc-6.2.0-1013-lowlatency": "6.2.0-1013.13~22.04.1", "linux-image-unsigned-6.2.0-1013-lowlatency-64k": "6.2.0-1013.13~22.04.1", "linux-lowlatency-hwe-6.2-tools-host": "6.2.0-1013.13~22.04.1", "linux-headers-6.2.0-1013-lowlatency-64k": "6.2.0-1013.13~22.04.1", "linux-image-unsigned-6.2.0-1013-lowlatency-dbgsym": "6.2.0-1013.13~22.04.1", "linux-modules-6.2.0-1013-lowlatency": "6.2.0-1013.13~22.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-6.5.0-14-lowlatency": "6.5.0-14.14.1~22.04.1", "linux-lowlatency-hwe-6.5-lib-rust-6.5.0-14-lowlatency": "6.5.0-14.14.1~22.04.1", "linux-modules-iwlwifi-6.5.0-14-lowlatency": "6.5.0-14.14.1~22.04.1", "linux-buildinfo-6.5.0-14-lowlatency-64k": "6.5.0-14.14.1~22.04.1", "linux-lowlatency-hwe-6.5-cloud-tools-common": "6.5.0-14.14.1~22.04.1", "linux-image-unsigned-6.5.0-14-lowlatency": "6.5.0-14.14.1~22.04.1", "linux-image-unsigned-6.5.0-14-lowlatency-64k-dbgsym": "6.5.0-14.14.1~22.04.1", "linux-lowlatency-hwe-6.5-cloud-tools-6.5.0-14": "6.5.0-14.14.1~22.04.1", "linux-image-unsigned-6.5.0-14-lowlatency-64k": "6.5.0-14.14.1~22.04.1", "linux-headers-6.5.0-14-lowlatency": "6.5.0-14.14.1~22.04.1", "linux-modules-6.5.0-14-lowlatency-64k": "6.5.0-14.14.1~22.04.1", "linux-tools-6.5.0-14-lowlatency-64k": "6.5.0-14.14.1~22.04.1", "linux-lowlatency-hwe-6.5-tools-host": "6.5.0-14.14.1~22.04.1", "linux-lowlatency-hwe-6.5-tools-6.5.0-14": "6.5.0-14.14.1~22.04.1", "linux-cloud-tools-6.5.0-14-lowlatency": "6.5.0-14.14.1~22.04.1", "linux-headers-6.5.0-14-lowlatency-64k": "6.5.0-14.14.1~22.04.1", "linux-tools-6.5.0-14-lowlatency": "6.5.0-14.14.1~22.04.1", "linux-modules-6.5.0-14-lowlatency": "6.5.0-14.14.1~22.04.1", "linux-lowlatency-hwe-6.5-tools-common": "6.5.0-14.14.1~22.04.1", "linux-lowlatency-hwe-6.5-headers-6.5.0-14": "6.5.0-14.14.1~22.04.1", "linux-image-unsigned-6.5.0-14-lowlatency-dbgsym": "6.5.0-14.14.1~22.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-modules-nvidia-fs-5.15.0-1033-nvidia": "5.15.0-1033.33", "linux-nvidia-cloud-tools-common": "5.15.0-1033.33", "linux-modules-nvidia-fs-5.15.0-1033-nvidia-lowlatency": "5.15.0-1033.33", "linux-modules-extra-5.15.0-1033-nvidia": "5.15.0-1033.33", "linux-nvidia-tools-common": "5.15.0-1033.33", "linux-image-unsigned-5.15.0-1033-nvidia-dbgsym": "5.15.0-1033.33", "linux-image-unsigned-5.15.0-1033-nvidia": "5.15.0-1033.33", "linux-image-unsigned-5.15.0-1033-nvidia-lowlatency-dbgsym": "5.15.0-1033.33", "linux-nvidia-cloud-tools-5.15.0-1033": "5.15.0-1033.33", "linux-cloud-tools-5.15.0-1033-nvidia": "5.15.0-1033.33", "linux-nvidia-headers-5.15.0-1033": "5.15.0-1033.33", "linux-modules-5.15.0-1033-nvidia-lowlatency": "5.15.0-1033.33", "linux-headers-5.15.0-1033-nvidia": "5.15.0-1033.33", "linux-headers-5.15.0-1033-nvidia-lowlatency": "5.15.0-1033.33", "linux-buildinfo-5.15.0-1033-nvidia": "5.15.0-1033.33", "linux-modules-5.15.0-1033-nvidia": "5.15.0-1033.33", "linux-image-unsigned-5.15.0-1033-nvidia-lowlatency": "5.15.0-1033.33", "linux-tools-5.15.0-1033-nvidia-lowlatency": "5.15.0-1033.33", "linux-cloud-tools-5.15.0-1033-nvidia-lowlatency": "5.15.0-1033.33", "linux-tools-5.15.0-1033-nvidia": "5.15.0-1033.33", "linux-nvidia-tools-5.15.0-1033": "5.15.0-1033.33", "linux-buildinfo-5.15.0-1033-nvidia-lowlatency": "5.15.0-1033.33", "linux-nvidia-tools-host": "5.15.0-1033.33" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-unsigned-6.2.0-1011-nvidia": "6.2.0-1011.11", "linux-nvidia-6.2-headers-6.2.0-1011": "6.2.0-1011.11", "linux-buildinfo-6.2.0-1011-nvidia-64k": "6.2.0-1011.11", "linux-image-unsigned-6.2.0-1011-nvidia-dbgsym": "6.2.0-1011.11", "linux-headers-6.2.0-1011-nvidia-64k": "6.2.0-1011.11", "linux-tools-6.2.0-1011-nvidia": "6.2.0-1011.11", "linux-buildinfo-6.2.0-1011-nvidia": "6.2.0-1011.11", "linux-modules-extra-6.2.0-1011-nvidia": "6.2.0-1011.11", "linux-modules-nvidia-fs-6.2.0-1011-nvidia": "6.2.0-1011.11", "linux-nvidia-6.2-tools-host": "6.2.0-1011.11", "linux-tools-6.2.0-1011-nvidia-64k": "6.2.0-1011.11", "linux-headers-6.2.0-1011-nvidia": "6.2.0-1011.11", "linux-nvidia-6.2-tools-6.2.0-1011": "6.2.0-1011.11", "linux-modules-6.2.0-1011-nvidia": "6.2.0-1011.11", "linux-image-unsigned-6.2.0-1011-nvidia-64k": "6.2.0-1011.11", "linux-image-unsigned-6.2.0-1011-nvidia-64k-dbgsym": "6.2.0-1011.11", "linux-modules-6.2.0-1011-nvidia-64k": "6.2.0-1011.11", "linux-modules-nvidia-fs-6.2.0-1011-nvidia-64k": "6.2.0-1011.11" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-headers-6.5.0-1004-nvidia": "6.5.0-1004.4", "linux-buildinfo-6.5.0-1004-nvidia": "6.5.0-1004.4", "linux-headers-6.5.0-1004-nvidia-64k": "6.5.0-1004.4", "linux-modules-extra-6.5.0-1004-nvidia": "6.5.0-1004.4", "linux-tools-6.5.0-1004-nvidia": "6.5.0-1004.4", "linux-nvidia-6.5-headers-6.5.0-1004": "6.5.0-1004.4", "linux-image-unsigned-6.5.0-1004-nvidia-64k": "6.5.0-1004.4", "linux-nvidia-6.5-tools-6.5.0-1004": "6.5.0-1004.4", "linux-image-unsigned-6.5.0-1004-nvidia-64k-dbgsym": "6.5.0-1004.4", "linux-modules-6.5.0-1004-nvidia-64k": "6.5.0-1004.4", "linux-nvidia-6.5-tools-host": "6.5.0-1004.4", "linux-modules-6.5.0-1004-nvidia": "6.5.0-1004.4", "linux-buildinfo-6.5.0-1004-nvidia-64k": "6.5.0-1004.4", "linux-tools-6.5.0-1004-nvidia-64k": "6.5.0-1004.4", "linux-image-unsigned-6.5.0-1004-nvidia": "6.5.0-1004.4", "linux-image-unsigned-6.5.0-1004-nvidia-dbgsym": "6.5.0-1004.4" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-modules-nvidia-fs-6.8.0-1008-nvidia-64k": "6.8.0-1008.8~22.04.1", "linux-nvidia-6.8-tools-6.8.0-1008": "6.8.0-1008.8~22.04.1", "linux-image-unsigned-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1", "linux-buildinfo-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1", "linux-image-unsigned-6.8.0-1008-nvidia-64k": "6.8.0-1008.8~22.04.1", "linux-modules-extra-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1", "linux-modules-6.8.0-1008-nvidia-64k": "6.8.0-1008.8~22.04.1", "linux-modules-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1", "linux-headers-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1", "linux-nvidia-6.8-headers-6.8.0-1008": "6.8.0-1008.8~22.04.1", "linux-headers-6.8.0-1008-nvidia-64k": "6.8.0-1008.8~22.04.1", "linux-modules-nvidia-fs-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1", "linux-nvidia-6.8-tools-host": "6.8.0-1008.8~22.04.1", "linux-image-unsigned-6.8.0-1008-nvidia-dbgsym": "6.8.0-1008.8~22.04.1", "linux-tools-6.8.0-1008-nvidia-64k": "6.8.0-1008.8~22.04.1", "linux-tools-6.8.0-1008-nvidia": "6.8.0-1008.8~22.04.1", "linux-buildinfo-6.8.0-1008-nvidia-64k": "6.8.0-1008.8~22.04.1", "linux-image-unsigned-6.8.0-1008-nvidia-64k-dbgsym": "6.8.0-1008.8~22.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-6.0.0-1021-oem": "6.0.0-1021.21", "linux-modules-iwlwifi-6.0.0-1021-oem": "6.0.0-1021.21", "linux-oem-6.0-tools-host": "6.0.0-1021.21", "linux-image-unsigned-6.0.0-1021-oem": "6.0.0-1021.21", "linux-modules-ivsc-6.0.0-1021-oem": "6.0.0-1021.21", "linux-tools-6.0.0-1021-oem": "6.0.0-1021.21", "linux-modules-6.0.0-1021-oem": "6.0.0-1021.21", "linux-oem-6.0-tools-6.0.0-1021": "6.0.0-1021.21", "linux-headers-6.0.0-1021-oem": "6.0.0-1021.21", "linux-image-unsigned-6.0.0-1021-oem-dbgsym": "6.0.0-1021.21", "linux-oem-6.0-headers-6.0.0-1021": "6.0.0-1021.21", "linux-modules-ipu6-6.0.0-1021-oem": "6.0.0-1021.21" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-unsigned-6.1.0-1022-oem": "6.1.0-1022.22", "linux-headers-6.1.0-1022-oem": "6.1.0-1022.22", "linux-image-unsigned-6.1.0-1022-oem-dbgsym": "6.1.0-1022.22", "linux-modules-6.1.0-1022-oem": "6.1.0-1022.22", "linux-modules-ivsc-6.1.0-1022-oem": "6.1.0-1022.22", "linux-tools-6.1.0-1022-oem": "6.1.0-1022.22", "linux-oem-6.1-tools-6.1.0-1022": "6.1.0-1022.22", "linux-buildinfo-6.1.0-1022-oem": "6.1.0-1022.22", "linux-oem-6.1-headers-6.1.0-1022": "6.1.0-1022.22", "linux-modules-ipu6-6.1.0-1022-oem": "6.1.0-1022.22", "linux-oem-6.1-tools-host": "6.1.0-1022.22", "linux-modules-iwlwifi-6.1.0-1022-oem": "6.1.0-1022.22" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-6.5.0-1003-oem": "6.5.0-1003.3", "linux-modules-iwlwifi-6.5.0-1003-oem": "6.5.0-1003.3", "linux-tools-6.5.0-1003-oem": "6.5.0-1003.3", "linux-headers-6.5.0-1003-oem": "6.5.0-1003.3", "linux-oem-6.5-lib-rust-6.5.0-1003-oem": "6.5.0-1003.3", "linux-image-unsigned-6.5.0-1003-oem-dbgsym": "6.5.0-1003.3", "linux-oem-6.5-tools-host": "6.5.0-1003.3", "linux-modules-ivsc-6.5.0-1003-oem": "6.5.0-1003.3", "linux-oem-6.5-tools-6.5.0-1003": "6.5.0-1003.3", "linux-modules-ipu6-6.5.0-1003-oem": "6.5.0-1003.3", "linux-modules-6.5.0-1003-oem": "6.5.0-1003.3", "linux-image-unsigned-6.5.0-1003-oem": "6.5.0-1003.3", "linux-oem-6.5-headers-6.5.0-1003": "6.5.0-1003.3" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-5.15.0-1044-oracle": "5.15.0-1044.50", "linux-modules-extra-5.15.0-1044-oracle": "5.15.0-1044.50", "linux-modules-5.15.0-1044-oracle": "5.15.0-1044.50", "linux-tools-5.15.0-1044-oracle": "5.15.0-1044.50", "linux-headers-5.15.0-1044-oracle": "5.15.0-1044.50", "linux-image-unsigned-5.15.0-1044-oracle-dbgsym": "5.15.0-1044.50", "linux-image-unsigned-5.15.0-1044-oracle": "5.15.0-1044.50", "linux-oracle-headers-5.15.0-1044": "5.15.0-1044.50", "linux-oracle-tools-5.15.0-1044": "5.15.0-1044.50" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-modules-6.5.0-1013-oracle": "6.5.0-1013.13~22.04.4", "linux-image-unsigned-6.5.0-1013-oracle": "6.5.0-1013.13~22.04.4", "linux-buildinfo-6.5.0-1013-oracle": "6.5.0-1013.13~22.04.4", "linux-modules-extra-6.5.0-1013-oracle": "6.5.0-1013.13~22.04.4", "linux-oracle-6.5-headers-6.5.0-1013": "6.5.0-1013.13~22.04.4", "linux-tools-6.5.0-1013-oracle": "6.5.0-1013.13~22.04.4", "linux-image-unsigned-6.5.0-1013-oracle-dbgsym": "6.5.0-1013.13~22.04.4", "linux-oracle-6.5-tools-6.5.0-1013": "6.5.0-1013.13~22.04.4", "linux-headers-6.5.0-1013-oracle": "6.5.0-1013.13~22.04.4", "linux-modules-iwlwifi-6.5.0-1013-oracle": "6.5.0-1013.13~22.04.4" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-modules-extra-5.15.0-1038-raspi": "5.15.0-1038.41", "linux-buildinfo-5.15.0-1038-raspi": "5.15.0-1038.41", "linux-image-5.15.0-1038-raspi-dbgsym": "5.15.0-1038.41", "linux-tools-5.15.0-1038-raspi": "5.15.0-1038.41", "linux-raspi-tools-5.15.0-1038": "5.15.0-1038.41", "linux-headers-5.15.0-1038-raspi": "5.15.0-1038.41", "linux-raspi-headers-5.15.0-1038": "5.15.0-1038.41", "linux-modules-5.15.0-1038-raspi": "5.15.0-1038.41", "linux-image-5.15.0-1038-raspi": "5.15.0-1038.41" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-6.5.0-17-generic": "6.5.0-17.17.1.1~22.04.1", "linux-headers-6.5.0-17-generic": "6.5.0-17.17.1.1~22.04.1", "linux-modules-6.5.0-17-generic": "6.5.0-17.17.1.1~22.04.1", "linux-modules-extra-6.5.0-17-generic": "6.5.0-17.17.1.1~22.04.1", "linux-image-6.5.0-17-generic-dbgsym": "6.5.0-17.17.1.1~22.04.1", "linux-image-6.5.0-17-generic": "6.5.0-17.17.1.1~22.04.1", "linux-riscv-6.5-headers-6.5.0-17": "6.5.0-17.17.1.1~22.04.1", "linux-riscv-6.5-tools-6.5.0-17": "6.5.0-17.17.1.1~22.04.1", "linux-tools-6.5.0-17-generic": "6.5.0-17.17.1.1~22.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-6.5.0-1007-starfive": "6.5.0-1007.8~22.04.1", "linux-image-6.5.0-1007-starfive-dbgsym": "6.5.0-1007.8~22.04.1", "linux-tools-6.5.0-1007-starfive": "6.5.0-1007.8~22.04.1", "linux-starfive-6.5-headers-6.5.0-1007": "6.5.0-1007.8~22.04.1", "linux-headers-6.5.0-1007-starfive": "6.5.0-1007.8~22.04.1", "linux-starfive-6.5-tools-6.5.0-1007": "6.5.0-1007.8~22.04.1", "linux-image-6.5.0-1007-starfive": "6.5.0-1007.8~22.04.1", "linux-modules-extra-6.5.0-1007-starfive": "6.5.0-1007.8~22.04.1", "linux-modules-6.5.0-1007-starfive": "6.5.0-1007.8~22.04.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-5.15.0-1025-xilinx-zynqmp-dbgsym": "5.15.0-1025.29", "linux-tools-5.15.0-1025-xilinx-zynqmp": "5.15.0-1025.29", "linux-modules-5.15.0-1025-xilinx-zynqmp": "5.15.0-1025.29", "linux-xilinx-zynqmp-tools-host": "5.15.0-1025.29", "linux-buildinfo-5.15.0-1025-xilinx-zynqmp": "5.15.0-1025.29", "linux-headers-5.15.0-1025-xilinx-zynqmp": "5.15.0-1025.29", "linux-xilinx-zynqmp-tools-5.15.0-1025": "5.15.0-1025.29", "linux-xilinx-zynqmp-headers-5.15.0-1025": "5.15.0-1025.29", "linux-xilinx-zynqmp-tools-common": "5.15.0-1025.29", "linux-image-5.15.0-1025-xilinx-zynqmp": "5.15.0-1025.29" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-tools-6.5.0-9-generic-64k": "6.5.0-9.9", "linux-cloud-tools-common": "6.5.0-9.9", "linux-modules-ivsc-6.5.0-9-generic": "6.5.0-9.9", "linux-libc-dev": "6.5.0-9.9", "linux-source-6.5.0": "6.5.0-9.9", "linux-doc": "6.5.0-9.9", "linux-image-unsigned-6.5.0-9-generic-dbgsym": "6.5.0-9.9", "linux-image-unsigned-6.5.0-9-generic-64k-dbgsym": "6.5.0-9.9", "linux-cloud-tools-6.5.0-9-generic": "6.5.0-9.9", "linux-lib-rust-6.5.0-9-generic": "6.5.0-9.9", "linux-modules-extra-6.5.0-9-generic": "6.5.0-9.9", "linux-modules-6.5.0-9-generic": "6.5.0-9.9", "linux-tools-6.5.0-9": "6.5.0-9.9", "linux-buildinfo-6.5.0-9-generic-64k": "6.5.0-9.9", "linux-headers-6.5.0-9-generic": "6.5.0-9.9", "linux-tools-host": "6.5.0-9.9", "linux-headers-6.5.0-9": "6.5.0-9.9", "linux-image-6.5.0-9-generic-dbgsym": "6.5.0-9.9", "linux-buildinfo-6.5.0-9-generic": "6.5.0-9.9", "linux-image-6.5.0-9-generic": "6.5.0-9.9", "linux-cloud-tools-6.5.0-9": "6.5.0-9.9", "linux-image-unsigned-6.5.0-9-generic-64k": "6.5.0-9.9", "linux-modules-iwlwifi-6.5.0-9-generic": "6.5.0-9.9", "linux-modules-ipu6-6.5.0-9-generic": "6.5.0-9.9", "linux-image-unsigned-6.5.0-9-generic": "6.5.0-9.9", "linux-modules-6.5.0-9-generic-64k": "6.5.0-9.9", "linux-tools-6.5.0-9-generic": "6.5.0-9.9", "linux-headers-6.5.0-9-generic-64k": "6.5.0-9.9", "linux-tools-common": "6.5.0-9.9" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-headers-6.5.0-1008-aws": "6.5.0-1008.8", "linux-modules-6.5.0-1008-aws": "6.5.0-1008.8", "linux-image-unsigned-6.5.0-1008-aws": "6.5.0-1008.8", "linux-image-unsigned-6.5.0-1008-aws-dbgsym": "6.5.0-1008.8", "linux-buildinfo-6.5.0-1008-aws": "6.5.0-1008.8", "linux-tools-6.5.0-1008-aws": "6.5.0-1008.8", "linux-aws-cloud-tools-6.5.0-1008": "6.5.0-1008.8", "linux-modules-extra-6.5.0-1008-aws": "6.5.0-1008.8", "linux-aws-headers-6.5.0-1008": "6.5.0-1008.8", "linux-aws-tools-6.5.0-1008": "6.5.0-1008.8", "linux-cloud-tools-6.5.0-1008-aws": "6.5.0-1008.8" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-azure-cloud-tools-6.5.0-1007": "6.5.0-1007.7", "linux-azure-tools-6.5.0-1007": "6.5.0-1007.7", "linux-modules-6.5.0-1007-azure": "6.5.0-1007.7", "linux-azure-headers-6.5.0-1007": "6.5.0-1007.7", "linux-tools-6.5.0-1007-azure": "6.5.0-1007.7", "linux-headers-6.5.0-1007-azure": "6.5.0-1007.7", "linux-modules-extra-6.5.0-1007-azure": "6.5.0-1007.7", "linux-image-unsigned-6.5.0-1007-azure": "6.5.0-1007.7", "linux-image-unsigned-6.5.0-1007-azure-dbgsym": "6.5.0-1007.7", "linux-cloud-tools-6.5.0-1007-azure": "6.5.0-1007.7", "linux-modules-iwlwifi-6.5.0-1007-azure": "6.5.0-1007.7", "linux-buildinfo-6.5.0-1007-azure": "6.5.0-1007.7" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-6.5.0-1007-gcp": "6.5.0-1007.7", "linux-gcp-headers-6.5.0-1007": "6.5.0-1007.7", "linux-modules-iwlwifi-6.5.0-1007-gcp": "6.5.0-1007.7", "linux-tools-6.5.0-1007-gcp": "6.5.0-1007.7", "linux-image-unsigned-6.5.0-1007-gcp-dbgsym": "6.5.0-1007.7", "linux-modules-extra-6.5.0-1007-gcp": "6.5.0-1007.7", "linux-image-unsigned-6.5.0-1007-gcp": "6.5.0-1007.7", "linux-modules-6.5.0-1007-gcp": "6.5.0-1007.7", "linux-gcp-tools-6.5.0-1007": "6.5.0-1007.7", "linux-headers-6.5.0-1007-gcp": "6.5.0-1007.7" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-buildinfo-6.8.0-1003-gke": "6.8.0-1003.5", "linux-gke-tools-6.8.0-1003": "6.8.0-1003.5", "linux-modules-extra-6.8.0-1003-gke": "6.8.0-1003.5", "linux-image-unsigned-6.8.0-1003-gke-dbgsym": "6.8.0-1003.5", "linux-headers-6.8.0-1003-gke": "6.8.0-1003.5", "linux-tools-6.8.0-1003-gke": "6.8.0-1003.5", "linux-gke-headers-6.8.0-1003": "6.8.0-1003.5", "linux-modules-6.8.0-1003-gke": "6.8.0-1003.5", "linux-image-unsigned-6.8.0-1003-gke": "6.8.0-1003.5" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-unsigned-6.5.0-1009-ibm": "6.5.0-1009.9", "linux-ibm-tools-common": "6.5.0-1009.9", "linux-ibm-headers-6.5.0-1009": "6.5.0-1009.9", "linux-buildinfo-6.5.0-1009-ibm": "6.5.0-1009.9", "linux-modules-6.5.0-1009-ibm": "6.5.0-1009.9", "linux-modules-extra-6.5.0-1009-ibm": "6.5.0-1009.9", "linux-tools-6.5.0-1009-ibm": "6.5.0-1009.9", "linux-ibm-tools-6.5.0-1009": "6.5.0-1009.9", "linux-modules-iwlwifi-6.5.0-1009-ibm": "6.5.0-1009.9", "linux-headers-6.5.0-1009-ibm": "6.5.0-1009.9", "linux-ibm-cloud-tools-common": "6.5.0-1009.9", "linux-ibm-source-6.5.0": "6.5.0-1009.9", "linux-image-unsigned-6.5.0-1009-ibm-dbgsym": "6.5.0-1009.9" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-unsigned-6.5.0-9-lowlatency-dbgsym": "6.5.0-9.9.1", "linux-lowlatency-cloud-tools-6.5.0-9": "6.5.0-9.9.1", "linux-headers-6.5.0-9-lowlatency-64k": "6.5.0-9.9.1", "linux-lowlatency-tools-common": "6.5.0-9.9.1", "linux-lowlatency-headers-6.5.0-9": "6.5.0-9.9.1", "linux-lowlatency-tools-6.5.0-9": "6.5.0-9.9.1", "linux-tools-6.5.0-9-lowlatency": "6.5.0-9.9.1", "linux-lowlatency-tools-host": "6.5.0-9.9.1", "linux-image-unsigned-6.5.0-9-lowlatency-64k-dbgsym": "6.5.0-9.9.1", "linux-modules-6.5.0-9-lowlatency-64k": "6.5.0-9.9.1", "linux-lowlatency-cloud-tools-common": "6.5.0-9.9.1", "linux-headers-6.5.0-9-lowlatency": "6.5.0-9.9.1", "linux-buildinfo-6.5.0-9-lowlatency": "6.5.0-9.9.1", "linux-cloud-tools-6.5.0-9-lowlatency": "6.5.0-9.9.1", "linux-modules-iwlwifi-6.5.0-9-lowlatency": "6.5.0-9.9.1", "linux-buildinfo-6.5.0-9-lowlatency-64k": "6.5.0-9.9.1", "linux-modules-6.5.0-9-lowlatency": "6.5.0-9.9.1", "linux-tools-6.5.0-9-lowlatency-64k": "6.5.0-9.9.1", "linux-image-unsigned-6.5.0-9-lowlatency-64k": "6.5.0-9.9.1", "linux-image-unsigned-6.5.0-9-lowlatency": "6.5.0-9.9.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-modules-nvidia-fs-6.8.0-1007-nvidia": "6.8.0-1007.7", "linux-headers-6.8.0-1007-nvidia": "6.8.0-1007.7", "linux-image-unsigned-6.8.0-1007-nvidia-dbgsym": "6.8.0-1007.7", "linux-buildinfo-6.8.0-1007-nvidia-64k": "6.8.0-1007.7", "linux-modules-6.8.0-1007-nvidia-64k": "6.8.0-1007.7", "linux-tools-6.8.0-1007-nvidia-64k": "6.8.0-1007.7", "linux-tools-6.8.0-1007-nvidia": "6.8.0-1007.7", "linux-image-unsigned-6.8.0-1007-nvidia-64k-dbgsym": "6.8.0-1007.7", "linux-headers-6.8.0-1007-nvidia-64k": "6.8.0-1007.7", "linux-modules-6.8.0-1007-nvidia": "6.8.0-1007.7", "linux-buildinfo-6.8.0-1007-nvidia": "6.8.0-1007.7", "linux-nvidia-tools-6.8.0-1007": "6.8.0-1007.7", "linux-modules-extra-6.8.0-1007-nvidia": "6.8.0-1007.7", "linux-image-unsigned-6.8.0-1007-nvidia-64k": "6.8.0-1007.7", "linux-nvidia-headers-6.8.0-1007": "6.8.0-1007.7", "linux-image-unsigned-6.8.0-1007-nvidia": "6.8.0-1007.7", "linux-nvidia-tools-host": "6.8.0-1007.7", "linux-modules-nvidia-fs-6.8.0-1007-nvidia-64k": "6.8.0-1007.7" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-nvidia-lowlatency-tools-host": "6.8.0-1009.9.1", "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency-64k": "6.8.0-1009.9.1", "linux-tools-6.8.0-1009-nvidia-lowlatency-64k": "6.8.0-1009.9.1", "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1", "linux-modules-nvidia-fs-6.8.0-1009-nvidia-lowlatency-64k": "6.8.0-1009.9.1", "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency-dbgsym": "6.8.0-1009.9.1", "linux-image-unsigned-6.8.0-1009-nvidia-lowlatency-64k-dbgsym": "6.8.0-1009.9.1", "linux-modules-nvidia-fs-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1", "linux-modules-6.8.0-1009-nvidia-lowlatency-64k": "6.8.0-1009.9.1", "linux-modules-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1", "linux-headers-6.8.0-1009-nvidia-lowlatency-64k": "6.8.0-1009.9.1", "linux-modules-extra-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1", "linux-buildinfo-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1", "linux-buildinfo-6.8.0-1009-nvidia-lowlatency-64k": "6.8.0-1009.9.1", "linux-headers-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1", "linux-nvidia-lowlatency-tools-6.8.0-1009": "6.8.0-1009.9.1", "linux-tools-6.8.0-1009-nvidia-lowlatency": "6.8.0-1009.9.1", "linux-nvidia-lowlatency-headers-6.8.0-1009": "6.8.0-1009.9.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-modules-ivsc-6.8.0-1003-oem": "6.8.0-1003.3", "linux-oem-6.8-tools-6.8.0-1003": "6.8.0-1003.3", "linux-image-unsigned-6.8.0-1003-oem-dbgsym": "6.8.0-1003.3", "linux-headers-6.8.0-1003-oem": "6.8.0-1003.3", "linux-oem-6.8-headers-6.8.0-1003": "6.8.0-1003.3", "linux-tools-6.8.0-1003-oem": "6.8.0-1003.3", "linux-image-unsigned-6.8.0-1003-oem": "6.8.0-1003.3", "linux-modules-ipu6-6.8.0-1003-oem": "6.8.0-1003.3", "linux-modules-iwlwifi-6.8.0-1003-oem": "6.8.0-1003.3", "linux-buildinfo-6.8.0-1003-oem": "6.8.0-1003.3", "linux-modules-6.8.0-1003-oem": "6.8.0-1003.3" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-unsigned-6.5.0-1010-oracle-dbgsym": "6.5.0-1010.10", "linux-buildinfo-6.5.0-1010-oracle": "6.5.0-1010.10", "linux-oracle-tools-6.5.0-1010": "6.5.0-1010.10", "linux-image-unsigned-6.5.0-1010-oracle": "6.5.0-1010.10", "linux-modules-6.5.0-1010-oracle": "6.5.0-1010.10", "linux-modules-extra-6.5.0-1010-oracle": "6.5.0-1010.10", "linux-headers-6.5.0-1010-oracle": "6.5.0-1010.10", "linux-oracle-headers-6.5.0-1010": "6.5.0-1010.10", "linux-tools-6.5.0-1010-oracle": "6.5.0-1010.10", "linux-modules-iwlwifi-6.5.0-1010-oracle": "6.5.0-1010.10" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-6.5.0-1005-raspi-dbgsym": "6.5.0-1005.7", "linux-headers-6.5.0-1005-raspi": "6.5.0-1005.7", "linux-raspi-tools-6.5.0-1005": "6.5.0-1005.7", "linux-modules-extra-6.5.0-1005-raspi": "6.5.0-1005.7", "linux-modules-6.5.0-1005-raspi": "6.5.0-1005.7", "linux-raspi-headers-6.5.0-1005": "6.5.0-1005.7", "linux-buildinfo-6.5.0-1005-raspi": "6.5.0-1005.7", "linux-image-6.5.0-1005-raspi": "6.5.0-1005.7", "linux-tools-6.5.0-1005-raspi": "6.5.0-1005.7" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }
{ "availability": "No subscription required", "ubuntu_priority": "high", "binaries": [ { "linux-image-6.5.0-9-generic": "6.5.0-9.9.1", "linux-headers-6.5.0-9-generic": "6.5.0-9.9.1", "linux-modules-extra-6.5.0-9-generic": "6.5.0-9.9.1", "linux-modules-6.5.0-9-generic": "6.5.0-9.9.1", "linux-riscv-tools-6.5.0-9": "6.5.0-9.9.1", "linux-image-6.5.0-9-generic-dbgsym": "6.5.0-9.9.1", "linux-tools-6.5.0-9-generic": "6.5.0-9.9.1", "linux-buildinfo-6.5.0-9-generic": "6.5.0-9.9.1", "linux-riscv-headers-6.5.0-9": "6.5.0-9.9.1" } ], "priority_reason": "By using unprivileged user namespaces, this can be exploited to achieve local privilege escalation." }