In the Linux kernel, the following vulnerability has been resolved: i3c: mipi-i3c-hci: Fix out of bounds access in hcidmairqhandler Do not loop over ring headers in hcidmairqhandler() that are not allocated and enabled in hcidmainit(). Otherwise out of bounds access will occur from rings->headers[i] access when i >= number of allocated ring headers.
{
"binaries": [
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "block-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "block-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "crypto-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "crypto-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "dasd-extra-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "dasd-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "fat-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "fat-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "fb-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "firewire-core-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "floppy-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "fs-core-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "fs-core-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "fs-secondary-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "fs-secondary-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "input-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "input-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "ipmi-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "ipmi-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "irda-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "irda-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "kernel-image-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "kernel-image-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-cloud-tools-4.15.0-23-generic"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-cloud-tools-4.15.0-23-lowlatency"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-headers-4.15.0-23"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-headers-4.15.0-23-generic"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-headers-4.15.0-23-generic-lpae"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-headers-4.15.0-23-lowlatency"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-hwe-edge-cloud-tools-4.15.0-23"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-hwe-edge-tools-4.15.0-23"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-hwe-edge-udebs-generic"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-hwe-edge-udebs-generic-lpae"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-image-4.15.0-23-generic"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-image-4.15.0-23-generic-lpae"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-image-4.15.0-23-lowlatency"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-image-unsigned-4.15.0-23-generic"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-image-unsigned-4.15.0-23-lowlatency"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-modules-4.15.0-23-generic"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-modules-4.15.0-23-generic-lpae"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-modules-4.15.0-23-lowlatency"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-modules-extra-4.15.0-23-generic"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-source-4.15.0"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-tools-4.15.0-23-generic"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-tools-4.15.0-23-generic-lpae"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "linux-tools-4.15.0-23-lowlatency"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "md-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "md-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "message-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "mouse-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "mouse-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "multipath-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "multipath-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "nfs-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "nfs-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "nic-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "nic-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "nic-pcmcia-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "nic-shared-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "nic-shared-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "nic-usb-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "nic-usb-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "parport-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "parport-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "pata-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "pcmcia-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "pcmcia-storage-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "plip-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "plip-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "ppp-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "ppp-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "sata-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "sata-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "scsi-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "scsi-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "serial-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "storage-core-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "storage-core-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "usb-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "usb-modules-4.15.0-23-generic-lpae-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "virtio-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "vlan-modules-4.15.0-23-generic-di"
},
{
"binary_version": "4.15.0-23.25~16.04.1",
"binary_name": "vlan-modules-4.15.0-23-generic-lpae-di"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.0.0-1027.30",
"binary_name": "linux-aws-5.0-tools-5.0.0-1027"
},
{
"binary_version": "5.0.0-1027.30",
"binary_name": "linux-aws-headers-5.0.0-1027"
},
{
"binary_version": "5.0.0-1027.30",
"binary_name": "linux-buildinfo-5.0.0-1027-aws"
},
{
"binary_version": "5.0.0-1027.30",
"binary_name": "linux-cloud-tools-5.0.0-1027-aws"
},
{
"binary_version": "5.0.0-1027.30",
"binary_name": "linux-headers-5.0.0-1027-aws"
},
{
"binary_version": "5.0.0-1027.30",
"binary_name": "linux-image-5.0.0-1027-aws"
},
{
"binary_version": "5.0.0-1027.30",
"binary_name": "linux-modules-5.0.0-1027-aws"
},
{
"binary_version": "5.0.0-1027.30",
"binary_name": "linux-modules-extra-5.0.0-1027-aws"
},
{
"binary_version": "5.0.0-1027.30",
"binary_name": "linux-tools-5.0.0-1027-aws"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.3.0-1035.37",
"binary_name": "linux-aws-5.3-cloud-tools-5.3.0-1035"
},
{
"binary_version": "5.3.0-1035.37",
"binary_name": "linux-aws-5.3-headers-5.3.0-1035"
},
{
"binary_version": "5.3.0-1035.37",
"binary_name": "linux-aws-5.3-tools-5.3.0-1035"
},
{
"binary_version": "5.3.0-1035.37",
"binary_name": "linux-buildinfo-5.3.0-1035-aws"
},
{
"binary_version": "5.3.0-1035.37",
"binary_name": "linux-cloud-tools-5.3.0-1035-aws"
},
{
"binary_version": "5.3.0-1035.37",
"binary_name": "linux-headers-5.3.0-1035-aws"
},
{
"binary_version": "5.3.0-1035.37",
"binary_name": "linux-image-5.3.0-1035-aws"
},
{
"binary_version": "5.3.0-1035.37",
"binary_name": "linux-modules-5.3.0-1035-aws"
},
{
"binary_version": "5.3.0-1035.37",
"binary_name": "linux-modules-extra-5.3.0-1035-aws"
},
{
"binary_version": "5.3.0-1035.37",
"binary_name": "linux-tools-5.3.0-1035-aws"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.0.0-1036.38",
"binary_name": "linux-azure-cloud-tools-5.0.0-1036"
},
{
"binary_version": "5.0.0-1036.38",
"binary_name": "linux-azure-headers-5.0.0-1036"
},
{
"binary_version": "5.0.0-1036.38",
"binary_name": "linux-azure-tools-5.0.0-1036"
},
{
"binary_version": "5.0.0-1036.38",
"binary_name": "linux-buildinfo-5.0.0-1036-azure"
},
{
"binary_version": "5.0.0-1036.38",
"binary_name": "linux-cloud-tools-5.0.0-1036-azure"
},
{
"binary_version": "5.0.0-1036.38",
"binary_name": "linux-headers-5.0.0-1036-azure"
},
{
"binary_version": "5.0.0-1036.38",
"binary_name": "linux-image-unsigned-5.0.0-1036-azure"
},
{
"binary_version": "5.0.0-1036.38",
"binary_name": "linux-modules-5.0.0-1036-azure"
},
{
"binary_version": "5.0.0-1036.38",
"binary_name": "linux-modules-extra-5.0.0-1036-azure"
},
{
"binary_version": "5.0.0-1036.38",
"binary_name": "linux-tools-5.0.0-1036-azure"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.3.0-1035.36",
"binary_name": "linux-azure-5.3-cloud-tools-5.3.0-1035"
},
{
"binary_version": "5.3.0-1035.36",
"binary_name": "linux-azure-5.3-headers-5.3.0-1035"
},
{
"binary_version": "5.3.0-1035.36",
"binary_name": "linux-azure-5.3-tools-5.3.0-1035"
},
{
"binary_version": "5.3.0-1035.36",
"binary_name": "linux-buildinfo-5.3.0-1035-azure"
},
{
"binary_version": "5.3.0-1035.36",
"binary_name": "linux-cloud-tools-5.3.0-1035-azure"
},
{
"binary_version": "5.3.0-1035.36",
"binary_name": "linux-headers-5.3.0-1035-azure"
},
{
"binary_version": "5.3.0-1035.36",
"binary_name": "linux-image-unsigned-5.3.0-1035-azure"
},
{
"binary_version": "5.3.0-1035.36",
"binary_name": "linux-modules-5.3.0-1035-azure"
},
{
"binary_version": "5.3.0-1035.36",
"binary_name": "linux-modules-extra-5.3.0-1035-azure"
},
{
"binary_version": "5.3.0-1035.36",
"binary_name": "linux-tools-5.3.0-1035-azure"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.0.0-1012.12~18.04.2",
"binary_name": "linux-azure-edge-cloud-tools-5.0.0-1012"
},
{
"binary_version": "5.0.0-1012.12~18.04.2",
"binary_name": "linux-azure-edge-tools-5.0.0-1012"
},
{
"binary_version": "5.0.0-1012.12~18.04.2",
"binary_name": "linux-azure-headers-5.0.0-1012"
},
{
"binary_version": "5.0.0-1012.12~18.04.2",
"binary_name": "linux-buildinfo-5.0.0-1012-azure"
},
{
"binary_version": "5.0.0-1012.12~18.04.2",
"binary_name": "linux-cloud-tools-5.0.0-1012-azure"
},
{
"binary_version": "5.0.0-1012.12~18.04.2",
"binary_name": "linux-headers-5.0.0-1012-azure"
},
{
"binary_version": "5.0.0-1012.12~18.04.2",
"binary_name": "linux-image-unsigned-5.0.0-1012-azure"
},
{
"binary_version": "5.0.0-1012.12~18.04.2",
"binary_name": "linux-modules-5.0.0-1012-azure"
},
{
"binary_version": "5.0.0-1012.12~18.04.2",
"binary_name": "linux-modules-extra-5.0.0-1012-azure"
},
{
"binary_version": "5.0.0-1012.12~18.04.2",
"binary_name": "linux-tools-5.0.0-1012-azure"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.0.0-1034.35",
"binary_name": "linux-buildinfo-5.0.0-1034-gcp"
},
{
"binary_version": "5.0.0-1034.35",
"binary_name": "linux-gcp-headers-5.0.0-1034"
},
{
"binary_version": "5.0.0-1034.35",
"binary_name": "linux-gcp-tools-5.0.0-1034"
},
{
"binary_version": "5.0.0-1034.35",
"binary_name": "linux-headers-5.0.0-1034-gcp"
},
{
"binary_version": "5.0.0-1034.35",
"binary_name": "linux-image-unsigned-5.0.0-1034-gcp"
},
{
"binary_version": "5.0.0-1034.35",
"binary_name": "linux-modules-5.0.0-1034-gcp"
},
{
"binary_version": "5.0.0-1034.35",
"binary_name": "linux-modules-extra-5.0.0-1034-gcp"
},
{
"binary_version": "5.0.0-1034.35",
"binary_name": "linux-tools-5.0.0-1034-gcp"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.3.0-1032.34~18.04.1",
"binary_name": "linux-buildinfo-5.3.0-1032-gcp"
},
{
"binary_version": "5.3.0-1032.34~18.04.1",
"binary_name": "linux-gcp-5.3-headers-5.3.0-1032"
},
{
"binary_version": "5.3.0-1032.34~18.04.1",
"binary_name": "linux-gcp-5.3-tools-5.3.0-1032"
},
{
"binary_version": "5.3.0-1032.34~18.04.1",
"binary_name": "linux-headers-5.3.0-1032-gcp"
},
{
"binary_version": "5.3.0-1032.34~18.04.1",
"binary_name": "linux-image-unsigned-5.3.0-1032-gcp"
},
{
"binary_version": "5.3.0-1032.34~18.04.1",
"binary_name": "linux-modules-5.3.0-1032-gcp"
},
{
"binary_version": "5.3.0-1032.34~18.04.1",
"binary_name": "linux-modules-extra-5.3.0-1032-gcp"
},
{
"binary_version": "5.3.0-1032.34~18.04.1",
"binary_name": "linux-tools-5.3.0-1032-gcp"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "4.15.0-1079.84",
"binary_name": "linux-buildinfo-4.15.0-1079-gke"
},
{
"binary_version": "4.15.0-1079.84",
"binary_name": "linux-gke-4.15-headers-4.15.0-1079"
},
{
"binary_version": "4.15.0-1079.84",
"binary_name": "linux-gke-4.15-tools-4.15.0-1079"
},
{
"binary_version": "4.15.0-1079.84",
"binary_name": "linux-headers-4.15.0-1079-gke"
},
{
"binary_version": "4.15.0-1079.84",
"binary_name": "linux-image-unsigned-4.15.0-1079-gke"
},
{
"binary_version": "4.15.0-1079.84",
"binary_name": "linux-modules-4.15.0-1079-gke"
},
{
"binary_version": "4.15.0-1079.84",
"binary_name": "linux-modules-extra-4.15.0-1079-gke"
},
{
"binary_version": "4.15.0-1079.84",
"binary_name": "linux-tools-4.15.0-1079-gke"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.4.0-1080.86~18.04.1",
"binary_name": "linux-buildinfo-5.4.0-1080-gke"
},
{
"binary_version": "5.4.0-1080.86~18.04.1",
"binary_name": "linux-gke-5.4-headers-5.4.0-1080"
},
{
"binary_version": "5.4.0-1080.86~18.04.1",
"binary_name": "linux-gke-5.4-tools-5.4.0-1080"
},
{
"binary_version": "5.4.0-1080.86~18.04.1",
"binary_name": "linux-headers-5.4.0-1080-gke"
},
{
"binary_version": "5.4.0-1080.86~18.04.1",
"binary_name": "linux-image-unsigned-5.4.0-1080-gke"
},
{
"binary_version": "5.4.0-1080.86~18.04.1",
"binary_name": "linux-modules-5.4.0-1080-gke"
},
{
"binary_version": "5.4.0-1080.86~18.04.1",
"binary_name": "linux-modules-extra-5.4.0-1080-gke"
},
{
"binary_version": "5.4.0-1080.86~18.04.1",
"binary_name": "linux-tools-5.4.0-1080-gke"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.4.0-1051.54~18.04.1",
"binary_name": "linux-buildinfo-5.4.0-1051-gkeop"
},
{
"binary_version": "5.4.0-1051.54~18.04.1",
"binary_name": "linux-cloud-tools-5.4.0-1051-gkeop"
},
{
"binary_version": "5.4.0-1051.54~18.04.1",
"binary_name": "linux-gkeop-5.4-cloud-tools-5.4.0-1051"
},
{
"binary_version": "5.4.0-1051.54~18.04.1",
"binary_name": "linux-gkeop-5.4-headers-5.4.0-1051"
},
{
"binary_version": "5.4.0-1051.54~18.04.1",
"binary_name": "linux-gkeop-5.4-source-5.4.0"
},
{
"binary_version": "5.4.0-1051.54~18.04.1",
"binary_name": "linux-gkeop-5.4-tools-5.4.0-1051"
},
{
"binary_version": "5.4.0-1051.54~18.04.1",
"binary_name": "linux-headers-5.4.0-1051-gkeop"
},
{
"binary_version": "5.4.0-1051.54~18.04.1",
"binary_name": "linux-image-unsigned-5.4.0-1051-gkeop"
},
{
"binary_version": "5.4.0-1051.54~18.04.1",
"binary_name": "linux-modules-5.4.0-1051-gkeop"
},
{
"binary_version": "5.4.0-1051.54~18.04.1",
"binary_name": "linux-modules-extra-5.4.0-1051-gkeop"
},
{
"binary_version": "5.4.0-1051.54~18.04.1",
"binary_name": "linux-tools-5.4.0-1051-gkeop"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.3.0-76.72",
"binary_name": "block-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "crypto-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "fat-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "fb-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "firewire-core-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "floppy-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "fs-core-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "fs-secondary-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "input-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "ipmi-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "kernel-image-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-buildinfo-5.3.0-76-generic"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-buildinfo-5.3.0-76-lowlatency"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-cloud-tools-5.3.0-76-generic"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-cloud-tools-5.3.0-76-lowlatency"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-headers-5.3.0-76-generic"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-headers-5.3.0-76-lowlatency"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-hwe-cloud-tools-5.3.0-76"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-hwe-headers-5.3.0-76"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-hwe-tools-5.3.0-76"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-hwe-udebs-generic"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-image-5.3.0-76-generic"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-image-5.3.0-76-lowlatency"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-image-unsigned-5.3.0-76-generic"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-image-unsigned-5.3.0-76-lowlatency"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-modules-5.3.0-76-generic"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-modules-5.3.0-76-lowlatency"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-modules-extra-5.3.0-76-generic"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-source-5.3.0"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-tools-5.3.0-76-generic"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "linux-tools-5.3.0-76-lowlatency"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "md-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "message-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "mouse-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "multipath-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "nfs-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "nic-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "nic-pcmcia-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "nic-shared-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "nic-usb-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "parport-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "pata-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "pcmcia-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "pcmcia-storage-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "plip-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "ppp-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "sata-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "scsi-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "serial-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "storage-core-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "usb-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "virtio-modules-5.3.0-76-generic-di"
},
{
"binary_version": "5.3.0-76.72",
"binary_name": "vlan-modules-5.3.0-76-generic-di"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "block-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "block-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "crypto-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "crypto-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "dasd-extra-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "dasd-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "fat-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "fat-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "fb-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "firewire-core-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "floppy-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "fs-core-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "fs-core-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "fs-secondary-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "fs-secondary-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "input-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "input-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "ipmi-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "ipmi-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "kernel-image-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "kernel-image-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-buildinfo-5.3.0-24-generic"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-buildinfo-5.3.0-24-generic-lpae"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-buildinfo-5.3.0-24-lowlatency"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-cloud-tools-5.3.0-24-generic"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-cloud-tools-5.3.0-24-lowlatency"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-headers-5.3.0-24"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-headers-5.3.0-24-generic"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-headers-5.3.0-24-generic-lpae"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-headers-5.3.0-24-lowlatency"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-hwe-edge-cloud-tools-5.3.0-24"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-hwe-edge-tools-5.3.0-24"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-hwe-edge-udebs-generic"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-hwe-edge-udebs-generic-lpae"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-image-5.3.0-24-generic"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-image-5.3.0-24-generic-lpae"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-image-5.3.0-24-lowlatency"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-image-unsigned-5.3.0-24-generic"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-image-unsigned-5.3.0-24-lowlatency"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-modules-5.3.0-24-generic"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-modules-5.3.0-24-generic-lpae"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-modules-5.3.0-24-lowlatency"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-modules-extra-5.3.0-24-generic"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-source-5.3.0"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-tools-5.3.0-24-generic"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-tools-5.3.0-24-generic-lpae"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "linux-tools-5.3.0-24-lowlatency"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "md-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "md-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "message-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "mouse-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "mouse-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "multipath-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "multipath-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "nfs-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "nfs-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "nic-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "nic-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "nic-pcmcia-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "nic-shared-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "nic-shared-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "nic-usb-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "nic-usb-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "parport-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "parport-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "pata-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "pcmcia-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "pcmcia-storage-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "plip-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "plip-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "ppp-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "ppp-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "sata-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "sata-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "scsi-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "scsi-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "serial-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "storage-core-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "storage-core-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "usb-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "usb-modules-5.3.0-24-generic-lpae-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "virtio-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "vlan-modules-5.3.0-24-generic-di"
},
{
"binary_version": "5.3.0-24.26~18.04.2",
"binary_name": "vlan-modules-5.3.0-24-generic-lpae-di"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "4.15.0-1103.114",
"binary_name": "block-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "crypto-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "fat-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "fb-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "firewire-core-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "floppy-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "fs-core-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "fs-secondary-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "input-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "ipmi-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "irda-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "kernel-image-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "linux-buildinfo-4.15.0-1103-oem"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "linux-headers-4.15.0-1103-oem"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "linux-image-unsigned-4.15.0-1103-oem"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "linux-modules-4.15.0-1103-oem"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "linux-oem-headers-4.15.0-1103"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "linux-oem-tools-4.15.0-1103"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "linux-tools-4.15.0-1103-oem"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "linux-udebs-oem"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "md-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "message-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "mouse-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "multipath-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "nfs-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "nic-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "nic-pcmcia-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "nic-shared-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "nic-usb-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "parport-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "pata-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "pcmcia-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "pcmcia-storage-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "plip-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "ppp-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "sata-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "scsi-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "serial-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "storage-core-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "usb-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "virtio-modules-4.15.0-1103-oem-di"
},
{
"binary_version": "4.15.0-1103.114",
"binary_name": "vlan-modules-4.15.0-1103-oem-di"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.0.0-1014.19",
"binary_name": "linux-buildinfo-5.0.0-1014-oracle"
},
{
"binary_version": "5.0.0-1014.19",
"binary_name": "linux-headers-5.0.0-1014-oracle"
},
{
"binary_version": "5.0.0-1014.19",
"binary_name": "linux-image-unsigned-5.0.0-1014-oracle"
},
{
"binary_version": "5.0.0-1014.19",
"binary_name": "linux-modules-5.0.0-1014-oracle"
},
{
"binary_version": "5.0.0-1014.19",
"binary_name": "linux-modules-extra-5.0.0-1014-oracle"
},
{
"binary_version": "5.0.0-1014.19",
"binary_name": "linux-oracle-5.0-headers-5.0.0-1014"
},
{
"binary_version": "5.0.0-1014.19",
"binary_name": "linux-oracle-5.0-tools-5.0.0-1014"
},
{
"binary_version": "5.0.0-1014.19",
"binary_name": "linux-tools-5.0.0-1014-oracle"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.3.0-1030.32~18.04.1",
"binary_name": "linux-buildinfo-5.3.0-1030-oracle"
},
{
"binary_version": "5.3.0-1030.32~18.04.1",
"binary_name": "linux-headers-5.3.0-1030-oracle"
},
{
"binary_version": "5.3.0-1030.32~18.04.1",
"binary_name": "linux-image-unsigned-5.3.0-1030-oracle"
},
{
"binary_version": "5.3.0-1030.32~18.04.1",
"binary_name": "linux-modules-5.3.0-1030-oracle"
},
{
"binary_version": "5.3.0-1030.32~18.04.1",
"binary_name": "linux-modules-extra-5.3.0-1030-oracle"
},
{
"binary_version": "5.3.0-1030.32~18.04.1",
"binary_name": "linux-oracle-5.3-headers-5.3.0-1030"
},
{
"binary_version": "5.3.0-1030.32~18.04.1",
"binary_name": "linux-oracle-5.3-tools-5.3.0-1030"
},
{
"binary_version": "5.3.0-1030.32~18.04.1",
"binary_name": "linux-tools-5.3.0-1030-oracle"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.15.0-1056.61~20.04.1",
"binary_name": "linux-aws-5.15-cloud-tools-5.15.0-1056"
},
{
"binary_version": "5.15.0-1056.61~20.04.1",
"binary_name": "linux-aws-5.15-headers-5.15.0-1056"
},
{
"binary_version": "5.15.0-1056.61~20.04.1",
"binary_name": "linux-aws-5.15-tools-5.15.0-1056"
},
{
"binary_version": "5.15.0-1056.61~20.04.1",
"binary_name": "linux-buildinfo-5.15.0-1056-aws"
},
{
"binary_version": "5.15.0-1056.61~20.04.1",
"binary_name": "linux-cloud-tools-5.15.0-1056-aws"
},
{
"binary_version": "5.15.0-1056.61~20.04.1",
"binary_name": "linux-headers-5.15.0-1056-aws"
},
{
"binary_version": "5.15.0-1056.61~20.04.1",
"binary_name": "linux-image-unsigned-5.15.0-1056-aws"
},
{
"binary_version": "5.15.0-1056.61~20.04.1",
"binary_name": "linux-modules-5.15.0-1056-aws"
},
{
"binary_version": "5.15.0-1056.61~20.04.1",
"binary_name": "linux-modules-extra-5.15.0-1056-aws"
},
{
"binary_version": "5.15.0-1056.61~20.04.1",
"binary_name": "linux-tools-5.15.0-1056-aws"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.15.0-1058.66~20.04.2",
"binary_name": "linux-azure-5.15-cloud-tools-5.15.0-1058"
},
{
"binary_version": "5.15.0-1058.66~20.04.2",
"binary_name": "linux-azure-5.15-headers-5.15.0-1058"
},
{
"binary_version": "5.15.0-1058.66~20.04.2",
"binary_name": "linux-azure-5.15-tools-5.15.0-1058"
},
{
"binary_version": "5.15.0-1058.66~20.04.2",
"binary_name": "linux-buildinfo-5.15.0-1058-azure"
},
{
"binary_version": "5.15.0-1058.66~20.04.2",
"binary_name": "linux-cloud-tools-5.15.0-1058-azure"
},
{
"binary_version": "5.15.0-1058.66~20.04.2",
"binary_name": "linux-headers-5.15.0-1058-azure"
},
{
"binary_version": "5.15.0-1058.66~20.04.2",
"binary_name": "linux-image-unsigned-5.15.0-1058-azure"
},
{
"binary_version": "5.15.0-1058.66~20.04.2",
"binary_name": "linux-modules-5.15.0-1058-azure"
},
{
"binary_version": "5.15.0-1058.66~20.04.2",
"binary_name": "linux-modules-extra-5.15.0-1058-azure"
},
{
"binary_version": "5.15.0-1058.66~20.04.2",
"binary_name": "linux-tools-5.15.0-1058-azure"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.15.0-1053.61~20.04.1",
"binary_name": "linux-buildinfo-5.15.0-1053-gcp"
},
{
"binary_version": "5.15.0-1053.61~20.04.1",
"binary_name": "linux-gcp-5.15-headers-5.15.0-1053"
},
{
"binary_version": "5.15.0-1053.61~20.04.1",
"binary_name": "linux-gcp-5.15-tools-5.15.0-1053"
},
{
"binary_version": "5.15.0-1053.61~20.04.1",
"binary_name": "linux-headers-5.15.0-1053-gcp"
},
{
"binary_version": "5.15.0-1053.61~20.04.1",
"binary_name": "linux-image-unsigned-5.15.0-1053-gcp"
},
{
"binary_version": "5.15.0-1053.61~20.04.1",
"binary_name": "linux-modules-5.15.0-1053-gcp"
},
{
"binary_version": "5.15.0-1053.61~20.04.1",
"binary_name": "linux-modules-extra-5.15.0-1053-gcp"
},
{
"binary_version": "5.15.0-1053.61~20.04.1",
"binary_name": "linux-modules-iwlwifi-5.15.0-1053-gcp"
},
{
"binary_version": "5.15.0-1053.61~20.04.1",
"binary_name": "linux-tools-5.15.0-1053-gcp"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.15.0-1038.44~20.04.1",
"binary_name": "linux-buildinfo-5.15.0-1038-gkeop"
},
{
"binary_version": "5.15.0-1038.44~20.04.1",
"binary_name": "linux-cloud-tools-5.15.0-1038-gkeop"
},
{
"binary_version": "5.15.0-1038.44~20.04.1",
"binary_name": "linux-gkeop-5.15-cloud-tools-5.15.0-1038"
},
{
"binary_version": "5.15.0-1038.44~20.04.1",
"binary_name": "linux-gkeop-5.15-headers-5.15.0-1038"
},
{
"binary_version": "5.15.0-1038.44~20.04.1",
"binary_name": "linux-gkeop-5.15-tools-5.15.0-1038"
},
{
"binary_version": "5.15.0-1038.44~20.04.1",
"binary_name": "linux-headers-5.15.0-1038-gkeop"
},
{
"binary_version": "5.15.0-1038.44~20.04.1",
"binary_name": "linux-image-unsigned-5.15.0-1038-gkeop"
},
{
"binary_version": "5.15.0-1038.44~20.04.1",
"binary_name": "linux-modules-5.15.0-1038-gkeop"
},
{
"binary_version": "5.15.0-1038.44~20.04.1",
"binary_name": "linux-modules-extra-5.15.0-1038-gkeop"
},
{
"binary_version": "5.15.0-1038.44~20.04.1",
"binary_name": "linux-tools-5.15.0-1038-gkeop"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "No subscription required"
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"binaries": [
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-buildinfo-5.15.0-100-generic"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-buildinfo-5.15.0-100-generic-64k"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-buildinfo-5.15.0-100-generic-lpae"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-cloud-tools-5.15.0-100-generic"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-headers-5.15.0-100-generic"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-headers-5.15.0-100-generic-64k"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-headers-5.15.0-100-generic-lpae"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-hwe-5.15-cloud-tools-5.15.0-100"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-hwe-5.15-cloud-tools-common"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-hwe-5.15-headers-5.15.0-100"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-hwe-5.15-source-5.15.0"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-hwe-5.15-tools-5.15.0-100"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-hwe-5.15-tools-common"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-hwe-5.15-tools-host"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-image-5.15.0-100-generic"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-image-5.15.0-100-generic-lpae"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-image-unsigned-5.15.0-100-generic"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-image-unsigned-5.15.0-100-generic-64k"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-modules-5.15.0-100-generic"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-modules-5.15.0-100-generic-64k"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-modules-5.15.0-100-generic-lpae"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-modules-extra-5.15.0-100-generic"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-modules-iwlwifi-5.15.0-100-generic"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-tools-5.15.0-100-generic"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-tools-5.15.0-100-generic-64k"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-tools-5.15.0-100-generic-lpae"
}
]
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"binaries": [
{
"binary_version": "5.15.0-1048.51~20.04.1",
"binary_name": "linux-buildinfo-5.15.0-1048-ibm"
},
{
"binary_version": "5.15.0-1048.51~20.04.1",
"binary_name": "linux-headers-5.15.0-1048-ibm"
},
{
"binary_version": "5.15.0-1048.51~20.04.1",
"binary_name": "linux-ibm-5.15-headers-5.15.0-1048"
},
{
"binary_version": "5.15.0-1048.51~20.04.1",
"binary_name": "linux-ibm-5.15-source-5.15.0"
},
{
"binary_version": "5.15.0-1048.51~20.04.1",
"binary_name": "linux-ibm-5.15-tools-5.15.0-1048"
},
{
"binary_version": "5.15.0-1048.51~20.04.1",
"binary_name": "linux-image-unsigned-5.15.0-1048-ibm"
},
{
"binary_version": "5.15.0-1048.51~20.04.1",
"binary_name": "linux-modules-5.15.0-1048-ibm"
},
{
"binary_version": "5.15.0-1048.51~20.04.1",
"binary_name": "linux-modules-extra-5.15.0-1048-ibm"
},
{
"binary_version": "5.15.0-1048.51~20.04.1",
"binary_name": "linux-tools-5.15.0-1048-ibm"
}
]
}{
"binaries": [
{
"binary_version": "5.15.0-1050.56~20.04.1",
"binary_name": "linux-buildinfo-5.15.0-1050-intel-iotg"
},
{
"binary_version": "5.15.0-1050.56~20.04.1",
"binary_name": "linux-cloud-tools-5.15.0-1050-intel-iotg"
},
{
"binary_version": "5.15.0-1050.56~20.04.1",
"binary_name": "linux-headers-5.15.0-1050-intel-iotg"
},
{
"binary_version": "5.15.0-1050.56~20.04.1",
"binary_name": "linux-image-unsigned-5.15.0-1050-intel-iotg"
},
{
"binary_version": "5.15.0-1050.56~20.04.1",
"binary_name": "linux-intel-iotg-5.15-cloud-tools-5.15.0-1050"
},
{
"binary_version": "5.15.0-1050.56~20.04.1",
"binary_name": "linux-intel-iotg-5.15-cloud-tools-common"
},
{
"binary_version": "5.15.0-1050.56~20.04.1",
"binary_name": "linux-intel-iotg-5.15-headers-5.15.0-1050"
},
{
"binary_version": "5.15.0-1050.56~20.04.1",
"binary_name": "linux-intel-iotg-5.15-tools-5.15.0-1050"
},
{
"binary_version": "5.15.0-1050.56~20.04.1",
"binary_name": "linux-intel-iotg-5.15-tools-common"
},
{
"binary_version": "5.15.0-1050.56~20.04.1",
"binary_name": "linux-intel-iotg-5.15-tools-host"
},
{
"binary_version": "5.15.0-1050.56~20.04.1",
"binary_name": "linux-modules-5.15.0-1050-intel-iotg"
},
{
"binary_version": "5.15.0-1050.56~20.04.1",
"binary_name": "linux-modules-extra-5.15.0-1050-intel-iotg"
},
{
"binary_version": "5.15.0-1050.56~20.04.1",
"binary_name": "linux-modules-iwlwifi-5.15.0-1050-intel-iotg"
},
{
"binary_version": "5.15.0-1050.56~20.04.1",
"binary_name": "linux-tools-5.15.0-1050-intel-iotg"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-buildinfo-5.15.0-100-lowlatency"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-buildinfo-5.15.0-100-lowlatency-64k"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-cloud-tools-5.15.0-100-lowlatency"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-headers-5.15.0-100-lowlatency"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-headers-5.15.0-100-lowlatency-64k"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-image-unsigned-5.15.0-100-lowlatency"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-image-unsigned-5.15.0-100-lowlatency-64k"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-100"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-lowlatency-hwe-5.15-cloud-tools-common"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-lowlatency-hwe-5.15-headers-5.15.0-100"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-lowlatency-hwe-5.15-tools-5.15.0-100"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-lowlatency-hwe-5.15-tools-common"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-lowlatency-hwe-5.15-tools-host"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-modules-5.15.0-100-lowlatency"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-modules-5.15.0-100-lowlatency-64k"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-modules-iwlwifi-5.15.0-100-lowlatency"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-tools-5.15.0-100-lowlatency"
},
{
"binary_version": "5.15.0-100.110~20.04.1",
"binary_name": "linux-tools-5.15.0-100-lowlatency-64k"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.15.0-1025.25~20.04.1",
"binary_name": "linux-buildinfo-5.15.0-1025-nvidia-tegra"
},
{
"binary_version": "5.15.0-1025.25~20.04.1",
"binary_name": "linux-buildinfo-5.15.0-1025-nvidia-tegra-rt"
},
{
"binary_version": "5.15.0-1025.25~20.04.1",
"binary_name": "linux-headers-5.15.0-1025-nvidia-tegra"
},
{
"binary_version": "5.15.0-1025.25~20.04.1",
"binary_name": "linux-headers-5.15.0-1025-nvidia-tegra-rt"
},
{
"binary_version": "5.15.0-1025.25~20.04.1",
"binary_name": "linux-image-unsigned-5.15.0-1025-nvidia-tegra"
},
{
"binary_version": "5.15.0-1025.25~20.04.1",
"binary_name": "linux-image-unsigned-5.15.0-1025-nvidia-tegra-rt"
},
{
"binary_version": "5.15.0-1025.25~20.04.1",
"binary_name": "linux-modules-5.15.0-1025-nvidia-tegra"
},
{
"binary_version": "5.15.0-1025.25~20.04.1",
"binary_name": "linux-modules-5.15.0-1025-nvidia-tegra-rt"
},
{
"binary_version": "5.15.0-1025.25~20.04.1",
"binary_name": "linux-modules-extra-5.15.0-1025-nvidia-tegra"
},
{
"binary_version": "5.15.0-1025.25~20.04.1",
"binary_name": "linux-nvidia-tegra-5.15-cloud-tools-common"
},
{
"binary_version": "5.15.0-1025.25~20.04.1",
"binary_name": "linux-nvidia-tegra-5.15-headers-5.15.0-1025"
},
{
"binary_version": "5.15.0-1025.25~20.04.1",
"binary_name": "linux-nvidia-tegra-5.15-tools-5.15.0-1025"
},
{
"binary_version": "5.15.0-1025.25~20.04.1",
"binary_name": "linux-nvidia-tegra-5.15-tools-common"
},
{
"binary_version": "5.15.0-1025.25~20.04.1",
"binary_name": "linux-nvidia-tegra-5.15-tools-host"
},
{
"binary_version": "5.15.0-1025.25~20.04.1",
"binary_name": "linux-tools-5.15.0-1025-nvidia-tegra"
},
{
"binary_version": "5.15.0-1025.25~20.04.1",
"binary_name": "linux-tools-5.15.0-1025-nvidia-tegra-rt"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "No subscription required"
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"binaries": [
{
"binary_version": "5.15.0-1053.59~20.04.1",
"binary_name": "linux-buildinfo-5.15.0-1053-oracle"
},
{
"binary_version": "5.15.0-1053.59~20.04.1",
"binary_name": "linux-headers-5.15.0-1053-oracle"
},
{
"binary_version": "5.15.0-1053.59~20.04.1",
"binary_name": "linux-image-unsigned-5.15.0-1053-oracle"
},
{
"binary_version": "5.15.0-1053.59~20.04.1",
"binary_name": "linux-modules-5.15.0-1053-oracle"
},
{
"binary_version": "5.15.0-1053.59~20.04.1",
"binary_name": "linux-modules-extra-5.15.0-1053-oracle"
},
{
"binary_version": "5.15.0-1053.59~20.04.1",
"binary_name": "linux-oracle-5.15-headers-5.15.0-1053"
},
{
"binary_version": "5.15.0-1053.59~20.04.1",
"binary_name": "linux-oracle-5.15-tools-5.15.0-1053"
},
{
"binary_version": "5.15.0-1053.59~20.04.1",
"binary_name": "linux-tools-5.15.0-1053-oracle"
}
]
}{
"binaries": [
{
"binary_version": "5.15.0-1051.55~20.04.1",
"binary_name": "linux-buildinfo-5.15.0-1051-generic"
},
{
"binary_version": "5.15.0-1051.55~20.04.1",
"binary_name": "linux-headers-5.15.0-1051-generic"
},
{
"binary_version": "5.15.0-1051.55~20.04.1",
"binary_name": "linux-image-5.15.0-1051-generic"
},
{
"binary_version": "5.15.0-1051.55~20.04.1",
"binary_name": "linux-modules-5.15.0-1051-generic"
},
{
"binary_version": "5.15.0-1051.55~20.04.1",
"binary_name": "linux-modules-extra-5.15.0-1051-generic"
},
{
"binary_version": "5.15.0-1051.55~20.04.1",
"binary_name": "linux-riscv-5.15-headers-5.15.0-1051"
},
{
"binary_version": "5.15.0-1051.55~20.04.1",
"binary_name": "linux-riscv-5.15-tools-5.15.0-1051"
},
{
"binary_version": "5.15.0-1051.55~20.04.1",
"binary_name": "linux-tools-5.15.0-1051-generic"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-aws-5.11-cloud-tools-5.11.0-1028"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-aws-5.11-headers-5.11.0-1028"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-aws-5.11-tools-5.11.0-1028"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-buildinfo-5.11.0-1028-aws"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-cloud-tools-5.11.0-1028-aws"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-headers-5.11.0-1028-aws"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-image-unsigned-5.11.0-1028-aws"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-modules-5.11.0-1028-aws"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-modules-extra-5.11.0-1028-aws"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-tools-5.11.0-1028-aws"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.13.0-1031.35~20.04.1",
"binary_name": "linux-aws-5.13-cloud-tools-5.13.0-1031"
},
{
"binary_version": "5.13.0-1031.35~20.04.1",
"binary_name": "linux-aws-5.13-headers-5.13.0-1031"
},
{
"binary_version": "5.13.0-1031.35~20.04.1",
"binary_name": "linux-aws-5.13-tools-5.13.0-1031"
},
{
"binary_version": "5.13.0-1031.35~20.04.1",
"binary_name": "linux-buildinfo-5.13.0-1031-aws"
},
{
"binary_version": "5.13.0-1031.35~20.04.1",
"binary_name": "linux-cloud-tools-5.13.0-1031-aws"
},
{
"binary_version": "5.13.0-1031.35~20.04.1",
"binary_name": "linux-headers-5.13.0-1031-aws"
},
{
"binary_version": "5.13.0-1031.35~20.04.1",
"binary_name": "linux-image-unsigned-5.13.0-1031-aws"
},
{
"binary_version": "5.13.0-1031.35~20.04.1",
"binary_name": "linux-modules-5.13.0-1031-aws"
},
{
"binary_version": "5.13.0-1031.35~20.04.1",
"binary_name": "linux-modules-extra-5.13.0-1031-aws"
},
{
"binary_version": "5.13.0-1031.35~20.04.1",
"binary_name": "linux-tools-5.13.0-1031-aws"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.8.0-1042.44~20.04.1",
"binary_name": "linux-aws-5.8-cloud-tools-5.8.0-1042"
},
{
"binary_version": "5.8.0-1042.44~20.04.1",
"binary_name": "linux-aws-5.8-headers-5.8.0-1042"
},
{
"binary_version": "5.8.0-1042.44~20.04.1",
"binary_name": "linux-aws-5.8-tools-5.8.0-1042"
},
{
"binary_version": "5.8.0-1042.44~20.04.1",
"binary_name": "linux-buildinfo-5.8.0-1042-aws"
},
{
"binary_version": "5.8.0-1042.44~20.04.1",
"binary_name": "linux-cloud-tools-5.8.0-1042-aws"
},
{
"binary_version": "5.8.0-1042.44~20.04.1",
"binary_name": "linux-headers-5.8.0-1042-aws"
},
{
"binary_version": "5.8.0-1042.44~20.04.1",
"binary_name": "linux-image-5.8.0-1042-aws"
},
{
"binary_version": "5.8.0-1042.44~20.04.1",
"binary_name": "linux-modules-5.8.0-1042-aws"
},
{
"binary_version": "5.8.0-1042.44~20.04.1",
"binary_name": "linux-modules-extra-5.8.0-1042-aws"
},
{
"binary_version": "5.8.0-1042.44~20.04.1",
"binary_name": "linux-tools-5.8.0-1042-aws"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.11.0-1028.31~20.04.2",
"binary_name": "linux-azure-5.11-cloud-tools-5.11.0-1028"
},
{
"binary_version": "5.11.0-1028.31~20.04.2",
"binary_name": "linux-azure-5.11-headers-5.11.0-1028"
},
{
"binary_version": "5.11.0-1028.31~20.04.2",
"binary_name": "linux-azure-5.11-tools-5.11.0-1028"
},
{
"binary_version": "5.11.0-1028.31~20.04.2",
"binary_name": "linux-buildinfo-5.11.0-1028-azure"
},
{
"binary_version": "5.11.0-1028.31~20.04.2",
"binary_name": "linux-cloud-tools-5.11.0-1028-azure"
},
{
"binary_version": "5.11.0-1028.31~20.04.2",
"binary_name": "linux-headers-5.11.0-1028-azure"
},
{
"binary_version": "5.11.0-1028.31~20.04.2",
"binary_name": "linux-image-unsigned-5.11.0-1028-azure"
},
{
"binary_version": "5.11.0-1028.31~20.04.2",
"binary_name": "linux-modules-5.11.0-1028-azure"
},
{
"binary_version": "5.11.0-1028.31~20.04.2",
"binary_name": "linux-modules-extra-5.11.0-1028-azure"
},
{
"binary_version": "5.11.0-1028.31~20.04.2",
"binary_name": "linux-tools-5.11.0-1028-azure"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.13.0-1031.37~20.04.1",
"binary_name": "linux-azure-5.13-cloud-tools-5.13.0-1031"
},
{
"binary_version": "5.13.0-1031.37~20.04.1",
"binary_name": "linux-azure-5.13-headers-5.13.0-1031"
},
{
"binary_version": "5.13.0-1031.37~20.04.1",
"binary_name": "linux-azure-5.13-tools-5.13.0-1031"
},
{
"binary_version": "5.13.0-1031.37~20.04.1",
"binary_name": "linux-buildinfo-5.13.0-1031-azure"
},
{
"binary_version": "5.13.0-1031.37~20.04.1",
"binary_name": "linux-cloud-tools-5.13.0-1031-azure"
},
{
"binary_version": "5.13.0-1031.37~20.04.1",
"binary_name": "linux-headers-5.13.0-1031-azure"
},
{
"binary_version": "5.13.0-1031.37~20.04.1",
"binary_name": "linux-image-unsigned-5.13.0-1031-azure"
},
{
"binary_version": "5.13.0-1031.37~20.04.1",
"binary_name": "linux-modules-5.13.0-1031-azure"
},
{
"binary_version": "5.13.0-1031.37~20.04.1",
"binary_name": "linux-modules-extra-5.13.0-1031-azure"
},
{
"binary_version": "5.13.0-1031.37~20.04.1",
"binary_name": "linux-tools-5.13.0-1031-azure"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.8.0-1043.46~20.04.1",
"binary_name": "linux-azure-5.8-cloud-tools-5.8.0-1043"
},
{
"binary_version": "5.8.0-1043.46~20.04.1",
"binary_name": "linux-azure-5.8-headers-5.8.0-1043"
},
{
"binary_version": "5.8.0-1043.46~20.04.1",
"binary_name": "linux-azure-5.8-tools-5.8.0-1043"
},
{
"binary_version": "5.8.0-1043.46~20.04.1",
"binary_name": "linux-buildinfo-5.8.0-1043-azure"
},
{
"binary_version": "5.8.0-1043.46~20.04.1",
"binary_name": "linux-cloud-tools-5.8.0-1043-azure"
},
{
"binary_version": "5.8.0-1043.46~20.04.1",
"binary_name": "linux-headers-5.8.0-1043-azure"
},
{
"binary_version": "5.8.0-1043.46~20.04.1",
"binary_name": "linux-image-unsigned-5.8.0-1043-azure"
},
{
"binary_version": "5.8.0-1043.46~20.04.1",
"binary_name": "linux-modules-5.8.0-1043-azure"
},
{
"binary_version": "5.8.0-1043.46~20.04.1",
"binary_name": "linux-modules-extra-5.8.0-1043-azure"
},
{
"binary_version": "5.8.0-1043.46~20.04.1",
"binary_name": "linux-tools-5.8.0-1043-azure"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.4.0-1103.109+cvm1.1",
"binary_name": "linux-image-unsigned-5.4.0-1103-azure-fde"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.11.0-1029.33~20.04.3",
"binary_name": "linux-buildinfo-5.11.0-1029-gcp"
},
{
"binary_version": "5.11.0-1029.33~20.04.3",
"binary_name": "linux-gcp-5.11-headers-5.11.0-1029"
},
{
"binary_version": "5.11.0-1029.33~20.04.3",
"binary_name": "linux-gcp-5.11-tools-5.11.0-1029"
},
{
"binary_version": "5.11.0-1029.33~20.04.3",
"binary_name": "linux-headers-5.11.0-1029-gcp"
},
{
"binary_version": "5.11.0-1029.33~20.04.3",
"binary_name": "linux-image-unsigned-5.11.0-1029-gcp"
},
{
"binary_version": "5.11.0-1029.33~20.04.3",
"binary_name": "linux-modules-5.11.0-1029-gcp"
},
{
"binary_version": "5.11.0-1029.33~20.04.3",
"binary_name": "linux-modules-extra-5.11.0-1029-gcp"
},
{
"binary_version": "5.11.0-1029.33~20.04.3",
"binary_name": "linux-tools-5.11.0-1029-gcp"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.13.0-1033.40~20.04.1",
"binary_name": "linux-buildinfo-5.13.0-1033-gcp"
},
{
"binary_version": "5.13.0-1033.40~20.04.1",
"binary_name": "linux-gcp-5.13-headers-5.13.0-1033"
},
{
"binary_version": "5.13.0-1033.40~20.04.1",
"binary_name": "linux-gcp-5.13-tools-5.13.0-1033"
},
{
"binary_version": "5.13.0-1033.40~20.04.1",
"binary_name": "linux-headers-5.13.0-1033-gcp"
},
{
"binary_version": "5.13.0-1033.40~20.04.1",
"binary_name": "linux-image-unsigned-5.13.0-1033-gcp"
},
{
"binary_version": "5.13.0-1033.40~20.04.1",
"binary_name": "linux-modules-5.13.0-1033-gcp"
},
{
"binary_version": "5.13.0-1033.40~20.04.1",
"binary_name": "linux-modules-extra-5.13.0-1033-gcp"
},
{
"binary_version": "5.13.0-1033.40~20.04.1",
"binary_name": "linux-tools-5.13.0-1033-gcp"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.8.0-1039.41",
"binary_name": "linux-buildinfo-5.8.0-1039-gcp"
},
{
"binary_version": "5.8.0-1039.41",
"binary_name": "linux-gcp-5.8-headers-5.8.0-1039"
},
{
"binary_version": "5.8.0-1039.41",
"binary_name": "linux-gcp-5.8-tools-5.8.0-1039"
},
{
"binary_version": "5.8.0-1039.41",
"binary_name": "linux-headers-5.8.0-1039-gcp"
},
{
"binary_version": "5.8.0-1039.41",
"binary_name": "linux-image-unsigned-5.8.0-1039-gcp"
},
{
"binary_version": "5.8.0-1039.41",
"binary_name": "linux-modules-5.8.0-1039-gcp"
},
{
"binary_version": "5.8.0-1039.41",
"binary_name": "linux-modules-extra-5.8.0-1039-gcp"
},
{
"binary_version": "5.8.0-1039.41",
"binary_name": "linux-tools-5.8.0-1039-gcp"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.4.0-1105.112",
"binary_name": "linux-buildinfo-5.4.0-1105-gke"
},
{
"binary_version": "5.4.0-1105.112",
"binary_name": "linux-gke-headers-5.4.0-1105"
},
{
"binary_version": "5.4.0-1105.112",
"binary_name": "linux-gke-tools-5.4.0-1105"
},
{
"binary_version": "5.4.0-1105.112",
"binary_name": "linux-headers-5.4.0-1105-gke"
},
{
"binary_version": "5.4.0-1105.112",
"binary_name": "linux-image-unsigned-5.4.0-1105-gke"
},
{
"binary_version": "5.4.0-1105.112",
"binary_name": "linux-modules-5.4.0-1105-gke"
},
{
"binary_version": "5.4.0-1105.112",
"binary_name": "linux-modules-extra-5.4.0-1105-gke"
},
{
"binary_version": "5.4.0-1105.112",
"binary_name": "linux-tools-5.4.0-1105-gke"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.15.0-1039.44~20.04.1",
"binary_name": "linux-buildinfo-5.15.0-1039-gke"
},
{
"binary_version": "5.15.0-1039.44~20.04.1",
"binary_name": "linux-gke-5.15-headers-5.15.0-1039"
},
{
"binary_version": "5.15.0-1039.44~20.04.1",
"binary_name": "linux-gke-5.15-tools-5.15.0-1039"
},
{
"binary_version": "5.15.0-1039.44~20.04.1",
"binary_name": "linux-headers-5.15.0-1039-gke"
},
{
"binary_version": "5.15.0-1039.44~20.04.1",
"binary_name": "linux-image-unsigned-5.15.0-1039-gke"
},
{
"binary_version": "5.15.0-1039.44~20.04.1",
"binary_name": "linux-modules-5.15.0-1039-gke"
},
{
"binary_version": "5.15.0-1039.44~20.04.1",
"binary_name": "linux-modules-extra-5.15.0-1039-gke"
},
{
"binary_version": "5.15.0-1039.44~20.04.1",
"binary_name": "linux-modules-iwlwifi-5.15.0-1039-gke"
},
{
"binary_version": "5.15.0-1039.44~20.04.1",
"binary_name": "linux-tools-5.15.0-1039-gke"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.4.0-1102.106",
"binary_name": "linux-buildinfo-5.4.0-1102-gkeop"
},
{
"binary_version": "5.4.0-1102.106",
"binary_name": "linux-cloud-tools-5.4.0-1102-gkeop"
},
{
"binary_version": "5.4.0-1102.106",
"binary_name": "linux-gkeop-cloud-tools-5.4.0-1102"
},
{
"binary_version": "5.4.0-1102.106",
"binary_name": "linux-gkeop-headers-5.4.0-1102"
},
{
"binary_version": "5.4.0-1102.106",
"binary_name": "linux-gkeop-source-5.4.0"
},
{
"binary_version": "5.4.0-1102.106",
"binary_name": "linux-gkeop-tools-5.4.0-1102"
},
{
"binary_version": "5.4.0-1102.106",
"binary_name": "linux-headers-5.4.0-1102-gkeop"
},
{
"binary_version": "5.4.0-1102.106",
"binary_name": "linux-image-unsigned-5.4.0-1102-gkeop"
},
{
"binary_version": "5.4.0-1102.106",
"binary_name": "linux-modules-5.4.0-1102-gkeop"
},
{
"binary_version": "5.4.0-1102.106",
"binary_name": "linux-modules-extra-5.4.0-1102-gkeop"
},
{
"binary_version": "5.4.0-1102.106",
"binary_name": "linux-tools-5.4.0-1102-gkeop"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "block-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "block-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "block-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "crypto-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "crypto-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "crypto-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "dasd-extra-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "dasd-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "fat-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "fat-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "fat-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "fb-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "firewire-core-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "floppy-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "fs-core-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "fs-core-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "fs-core-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "fs-secondary-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "fs-secondary-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "fs-secondary-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "input-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "input-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "input-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "ipmi-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "ipmi-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "ipmi-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "kernel-image-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "kernel-image-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "kernel-image-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-buildinfo-5.11.0-46-generic"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-buildinfo-5.11.0-46-generic-64k"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-buildinfo-5.11.0-46-generic-lpae"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-buildinfo-5.11.0-46-lowlatency"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-cloud-tools-5.11.0-46-generic"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-cloud-tools-5.11.0-46-lowlatency"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-headers-5.11.0-46-generic"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-headers-5.11.0-46-generic-64k"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-headers-5.11.0-46-generic-lpae"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-headers-5.11.0-46-lowlatency"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-hwe-5.11-cloud-tools-5.11.0-46"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-hwe-5.11-cloud-tools-common"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-hwe-5.11-headers-5.11.0-46"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-hwe-5.11-source-5.11.0"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-hwe-5.11-tools-5.11.0-46"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-hwe-5.11-tools-common"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-hwe-5.11-tools-host"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-hwe-5.11-udebs-generic"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-hwe-5.11-udebs-generic-64k"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-hwe-5.11-udebs-generic-lpae"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-image-5.11.0-46-generic"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-image-5.11.0-46-generic-lpae"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-image-unsigned-5.11.0-46-generic"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-image-unsigned-5.11.0-46-generic-64k"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-image-unsigned-5.11.0-46-lowlatency"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-modules-5.11.0-46-generic"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-modules-5.11.0-46-generic-64k"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-modules-5.11.0-46-generic-lpae"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-modules-5.11.0-46-lowlatency"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-modules-extra-5.11.0-46-generic"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-tools-5.11.0-46-generic"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-tools-5.11.0-46-generic-64k"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-tools-5.11.0-46-generic-lpae"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "linux-tools-5.11.0-46-lowlatency"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "md-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "md-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "md-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "message-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "message-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "mouse-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "mouse-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "mouse-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "multipath-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "multipath-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "multipath-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "nfs-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "nfs-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "nfs-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "nic-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "nic-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "nic-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "nic-pcmcia-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "nic-shared-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "nic-shared-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "nic-shared-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "nic-usb-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "nic-usb-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "nic-usb-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "parport-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "parport-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "parport-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "pata-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "pcmcia-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "pcmcia-storage-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "plip-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "plip-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "plip-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "ppp-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "ppp-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "ppp-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "sata-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "sata-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "sata-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "scsi-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "scsi-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "scsi-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "serial-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "storage-core-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "storage-core-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "storage-core-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "usb-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "usb-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "usb-modules-5.11.0-46-generic-lpae-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "virtio-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "virtio-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "vlan-modules-5.11.0-46-generic-64k-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "vlan-modules-5.11.0-46-generic-di"
},
{
"binary_version": "5.11.0-46.51~20.04.1",
"binary_name": "vlan-modules-5.11.0-46-generic-lpae-di"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "block-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "block-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "block-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "crypto-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "crypto-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "crypto-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "dasd-extra-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "dasd-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "fat-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "fat-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "fat-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "fb-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "firewire-core-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "floppy-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "fs-core-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "fs-core-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "fs-core-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "fs-secondary-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "fs-secondary-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "fs-secondary-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "input-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "input-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "input-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "ipmi-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "ipmi-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "ipmi-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "kernel-image-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "kernel-image-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "kernel-image-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-buildinfo-5.13.0-52-generic"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-buildinfo-5.13.0-52-generic-64k"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-buildinfo-5.13.0-52-generic-lpae"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-buildinfo-5.13.0-52-lowlatency"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-cloud-tools-5.13.0-52-generic"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-cloud-tools-5.13.0-52-lowlatency"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-headers-5.13.0-52-generic"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-headers-5.13.0-52-generic-64k"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-headers-5.13.0-52-generic-lpae"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-headers-5.13.0-52-lowlatency"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-hwe-5.13-cloud-tools-5.13.0-52"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-hwe-5.13-cloud-tools-common"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-hwe-5.13-headers-5.13.0-52"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-hwe-5.13-source-5.13.0"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-hwe-5.13-tools-5.13.0-52"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-hwe-5.13-tools-common"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-hwe-5.13-tools-host"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-hwe-5.13-udebs-generic"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-hwe-5.13-udebs-generic-64k"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-hwe-5.13-udebs-generic-lpae"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-image-5.13.0-52-generic"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-image-5.13.0-52-generic-lpae"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-image-unsigned-5.13.0-52-generic"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-image-unsigned-5.13.0-52-generic-64k"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-image-unsigned-5.13.0-52-lowlatency"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-modules-5.13.0-52-generic"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-modules-5.13.0-52-generic-64k"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-modules-5.13.0-52-generic-lpae"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-modules-5.13.0-52-lowlatency"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-modules-extra-5.13.0-52-generic"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-tools-5.13.0-52-generic"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-tools-5.13.0-52-generic-64k"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-tools-5.13.0-52-generic-lpae"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "linux-tools-5.13.0-52-lowlatency"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "md-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "md-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "md-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "message-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "message-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "mouse-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "mouse-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "mouse-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "multipath-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "multipath-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "multipath-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "nfs-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "nfs-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "nfs-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "nic-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "nic-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "nic-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "nic-pcmcia-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "nic-shared-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "nic-shared-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "nic-shared-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "nic-usb-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "nic-usb-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "nic-usb-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "parport-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "parport-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "parport-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "pata-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "pcmcia-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "pcmcia-storage-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "plip-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "plip-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "plip-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "ppp-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "ppp-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "ppp-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "sata-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "sata-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "sata-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "scsi-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "scsi-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "scsi-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "serial-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "storage-core-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "storage-core-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "storage-core-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "usb-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "usb-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "usb-modules-5.13.0-52-generic-lpae-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "virtio-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "virtio-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "vlan-modules-5.13.0-52-generic-64k-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "vlan-modules-5.13.0-52-generic-di"
},
{
"binary_version": "5.13.0-52.59~20.04.1",
"binary_name": "vlan-modules-5.13.0-52-generic-lpae-di"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "block-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "block-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "block-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "crypto-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "crypto-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "crypto-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "dasd-extra-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "dasd-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "fat-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "fat-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "fat-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "fb-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "firewire-core-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "floppy-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "fs-core-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "fs-core-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "fs-core-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "fs-secondary-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "fs-secondary-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "fs-secondary-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "input-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "input-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "input-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "ipmi-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "ipmi-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "ipmi-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "kernel-image-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "kernel-image-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "kernel-image-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-buildinfo-5.8.0-63-generic"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-buildinfo-5.8.0-63-generic-64k"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-buildinfo-5.8.0-63-generic-lpae"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-buildinfo-5.8.0-63-lowlatency"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-cloud-tools-5.8.0-63-generic"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-cloud-tools-5.8.0-63-lowlatency"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-headers-5.8.0-63-generic"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-headers-5.8.0-63-generic-64k"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-headers-5.8.0-63-generic-lpae"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-headers-5.8.0-63-lowlatency"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-hwe-5.8-cloud-tools-5.8.0-63"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-hwe-5.8-cloud-tools-common"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-hwe-5.8-headers-5.8.0-63"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-hwe-5.8-source-5.8.0"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-hwe-5.8-tools-5.8.0-63"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-hwe-5.8-tools-common"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-hwe-5.8-tools-host"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-hwe-5.8-udebs-generic"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-hwe-5.8-udebs-generic-64k"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-hwe-5.8-udebs-generic-lpae"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-image-5.8.0-63-generic"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-image-5.8.0-63-generic-lpae"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-image-unsigned-5.8.0-63-generic"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-image-unsigned-5.8.0-63-generic-64k"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-image-unsigned-5.8.0-63-lowlatency"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-modules-5.8.0-63-generic"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-modules-5.8.0-63-generic-64k"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-modules-5.8.0-63-generic-lpae"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-modules-5.8.0-63-lowlatency"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-modules-extra-5.8.0-63-generic"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-tools-5.8.0-63-generic"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-tools-5.8.0-63-generic-64k"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-tools-5.8.0-63-generic-lpae"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "linux-tools-5.8.0-63-lowlatency"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "md-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "md-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "md-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "message-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "message-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "mouse-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "mouse-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "mouse-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "multipath-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "multipath-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "multipath-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "nfs-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "nfs-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "nfs-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "nic-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "nic-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "nic-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "nic-pcmcia-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "nic-shared-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "nic-shared-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "nic-shared-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "nic-usb-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "nic-usb-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "nic-usb-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "parport-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "parport-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "parport-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "pata-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "pcmcia-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "pcmcia-storage-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "plip-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "plip-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "plip-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "ppp-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "ppp-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "ppp-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "sata-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "sata-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "sata-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "scsi-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "scsi-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "scsi-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "serial-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "storage-core-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "storage-core-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "storage-core-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "usb-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "usb-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "usb-modules-5.8.0-63-generic-lpae-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "virtio-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "virtio-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "vlan-modules-5.8.0-63-generic-64k-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "vlan-modules-5.8.0-63-generic-di"
},
{
"binary_version": "5.8.0-63.71~20.04.1",
"binary_name": "vlan-modules-5.8.0-63-generic-lpae-di"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-buildinfo-5.13.0-1017-intel"
},
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-cloud-tools-5.13.0-1017-intel"
},
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-headers-5.13.0-1017-intel"
},
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-image-unsigned-5.13.0-1017-intel"
},
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-intel-5.13-cloud-tools-5.13.0-1017"
},
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-intel-5.13-cloud-tools-common"
},
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-intel-5.13-headers-5.13.0-1017"
},
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-intel-5.13-source-5.13.0"
},
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-intel-5.13-tools-5.13.0-1017"
},
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-intel-5.13-tools-common"
},
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-intel-5.13-tools-host"
},
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-modules-5.13.0-1017-intel"
},
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-modules-extra-5.13.0-1017-intel"
},
{
"binary_version": "5.13.0-1017.19",
"binary_name": "linux-tools-5.13.0-1017-intel"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.10.0-1057.61",
"binary_name": "linux-buildinfo-5.10.0-1057-oem"
},
{
"binary_version": "5.10.0-1057.61",
"binary_name": "linux-headers-5.10.0-1057-oem"
},
{
"binary_version": "5.10.0-1057.61",
"binary_name": "linux-image-unsigned-5.10.0-1057-oem"
},
{
"binary_version": "5.10.0-1057.61",
"binary_name": "linux-modules-5.10.0-1057-oem"
},
{
"binary_version": "5.10.0-1057.61",
"binary_name": "linux-oem-5.10-headers-5.10.0-1057"
},
{
"binary_version": "5.10.0-1057.61",
"binary_name": "linux-oem-5.10-tools-5.10.0-1057"
},
{
"binary_version": "5.10.0-1057.61",
"binary_name": "linux-oem-5.10-tools-host"
},
{
"binary_version": "5.10.0-1057.61",
"binary_name": "linux-tools-5.10.0-1057-oem"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.13.0-1029.36",
"binary_name": "linux-buildinfo-5.13.0-1029-oem"
},
{
"binary_version": "5.13.0-1029.36",
"binary_name": "linux-headers-5.13.0-1029-oem"
},
{
"binary_version": "5.13.0-1029.36",
"binary_name": "linux-image-unsigned-5.13.0-1029-oem"
},
{
"binary_version": "5.13.0-1029.36",
"binary_name": "linux-modules-5.13.0-1029-oem"
},
{
"binary_version": "5.13.0-1029.36",
"binary_name": "linux-oem-5.13-headers-5.13.0-1029"
},
{
"binary_version": "5.13.0-1029.36",
"binary_name": "linux-oem-5.13-tools-5.13.0-1029"
},
{
"binary_version": "5.13.0-1029.36",
"binary_name": "linux-oem-5.13-tools-host"
},
{
"binary_version": "5.13.0-1029.36",
"binary_name": "linux-tools-5.13.0-1029-oem"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.14.0-1059.67",
"binary_name": "linux-buildinfo-5.14.0-1059-oem"
},
{
"binary_version": "5.14.0-1059.67",
"binary_name": "linux-headers-5.14.0-1059-oem"
},
{
"binary_version": "5.14.0-1059.67",
"binary_name": "linux-image-unsigned-5.14.0-1059-oem"
},
{
"binary_version": "5.14.0-1059.67",
"binary_name": "linux-modules-5.14.0-1059-oem"
},
{
"binary_version": "5.14.0-1059.67",
"binary_name": "linux-modules-iwlwifi-5.14.0-1059-oem"
},
{
"binary_version": "5.14.0-1059.67",
"binary_name": "linux-oem-5.14-headers-5.14.0-1059"
},
{
"binary_version": "5.14.0-1059.67",
"binary_name": "linux-oem-5.14-tools-5.14.0-1059"
},
{
"binary_version": "5.14.0-1059.67",
"binary_name": "linux-oem-5.14-tools-host"
},
{
"binary_version": "5.14.0-1059.67",
"binary_name": "linux-tools-5.14.0-1059-oem"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.6.0-1056.60",
"binary_name": "linux-buildinfo-5.6.0-1056-oem"
},
{
"binary_version": "5.6.0-1056.60",
"binary_name": "linux-headers-5.6.0-1056-oem"
},
{
"binary_version": "5.6.0-1056.60",
"binary_name": "linux-image-unsigned-5.6.0-1056-oem"
},
{
"binary_version": "5.6.0-1056.60",
"binary_name": "linux-modules-5.6.0-1056-oem"
},
{
"binary_version": "5.6.0-1056.60",
"binary_name": "linux-oem-5.6-headers-5.6.0-1056"
},
{
"binary_version": "5.6.0-1056.60",
"binary_name": "linux-oem-5.6-tools-5.6.0-1056"
},
{
"binary_version": "5.6.0-1056.60",
"binary_name": "linux-oem-5.6-tools-host"
},
{
"binary_version": "5.6.0-1056.60",
"binary_name": "linux-tools-5.6.0-1056-oem"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-buildinfo-5.11.0-1028-oracle"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-headers-5.11.0-1028-oracle"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-image-unsigned-5.11.0-1028-oracle"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-modules-5.11.0-1028-oracle"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-modules-extra-5.11.0-1028-oracle"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-oracle-5.11-headers-5.11.0-1028"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-oracle-5.11-tools-5.11.0-1028"
},
{
"binary_version": "5.11.0-1028.31~20.04.1",
"binary_name": "linux-tools-5.11.0-1028-oracle"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.13.0-1036.43~20.04.1",
"binary_name": "linux-buildinfo-5.13.0-1036-oracle"
},
{
"binary_version": "5.13.0-1036.43~20.04.1",
"binary_name": "linux-headers-5.13.0-1036-oracle"
},
{
"binary_version": "5.13.0-1036.43~20.04.1",
"binary_name": "linux-image-unsigned-5.13.0-1036-oracle"
},
{
"binary_version": "5.13.0-1036.43~20.04.1",
"binary_name": "linux-modules-5.13.0-1036-oracle"
},
{
"binary_version": "5.13.0-1036.43~20.04.1",
"binary_name": "linux-modules-extra-5.13.0-1036-oracle"
},
{
"binary_version": "5.13.0-1036.43~20.04.1",
"binary_name": "linux-oracle-5.13-headers-5.13.0-1036"
},
{
"binary_version": "5.13.0-1036.43~20.04.1",
"binary_name": "linux-oracle-5.13-tools-5.13.0-1036"
},
{
"binary_version": "5.13.0-1036.43~20.04.1",
"binary_name": "linux-tools-5.13.0-1036-oracle"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.8.0-1038.39~20.04.1",
"binary_name": "linux-buildinfo-5.8.0-1038-oracle"
},
{
"binary_version": "5.8.0-1038.39~20.04.1",
"binary_name": "linux-headers-5.8.0-1038-oracle"
},
{
"binary_version": "5.8.0-1038.39~20.04.1",
"binary_name": "linux-image-unsigned-5.8.0-1038-oracle"
},
{
"binary_version": "5.8.0-1038.39~20.04.1",
"binary_name": "linux-modules-5.8.0-1038-oracle"
},
{
"binary_version": "5.8.0-1038.39~20.04.1",
"binary_name": "linux-modules-extra-5.8.0-1038-oracle"
},
{
"binary_version": "5.8.0-1038.39~20.04.1",
"binary_name": "linux-oracle-5.8-headers-5.8.0-1038"
},
{
"binary_version": "5.8.0-1038.39~20.04.1",
"binary_name": "linux-oracle-5.8-tools-5.8.0-1038"
},
{
"binary_version": "5.8.0-1038.39~20.04.1",
"binary_name": "linux-tools-5.8.0-1038-oracle"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.4.0-1006.6",
"binary_name": "linux-buildinfo-5.4.0-1006-raspi2"
},
{
"binary_version": "5.4.0-1006.6",
"binary_name": "linux-headers-5.4.0-1006-raspi2"
},
{
"binary_version": "5.4.0-1006.6",
"binary_name": "linux-image-5.4.0-1006-raspi2"
},
{
"binary_version": "5.4.0-1006.6",
"binary_name": "linux-modules-5.4.0-1006-raspi2"
},
{
"binary_version": "5.4.0-1006.6",
"binary_name": "linux-raspi2-headers-5.4.0-1006"
},
{
"binary_version": "5.4.0-1006.6",
"binary_name": "linux-raspi2-tools-5.4.0-1006"
},
{
"binary_version": "5.4.0-1006.6",
"binary_name": "linux-tools-5.4.0-1006-raspi2"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.4.0-40.45",
"binary_name": "block-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "crypto-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "fat-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "firewire-core-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "fs-core-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "fs-secondary-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "input-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "ipmi-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "kernel-image-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "linux-buildinfo-5.4.0-40-generic"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "linux-headers-5.4.0-40-generic"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "linux-image-5.4.0-40-generic"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "linux-modules-5.4.0-40-generic"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "linux-modules-extra-5.4.0-40-generic"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "linux-riscv-headers-5.4.0-40"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "linux-riscv-tools-5.4.0-40"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "linux-tools-5.4.0-40-generic"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "linux-udebs-generic"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "md-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "message-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "mouse-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "multipath-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "nfs-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "nic-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "nic-shared-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "nic-usb-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "parport-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "pata-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "plip-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "ppp-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "sata-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "scsi-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "storage-core-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "usb-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "virtio-modules-5.4.0-40-generic-di"
},
{
"binary_version": "5.4.0-40.45",
"binary_name": "vlan-modules-5.4.0-40-generic-di"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.11.0-1031.35",
"binary_name": "linux-buildinfo-5.11.0-1031-generic"
},
{
"binary_version": "5.11.0-1031.35",
"binary_name": "linux-headers-5.11.0-1031-generic"
},
{
"binary_version": "5.11.0-1031.35",
"binary_name": "linux-image-5.11.0-1031-generic"
},
{
"binary_version": "5.11.0-1031.35",
"binary_name": "linux-modules-5.11.0-1031-generic"
},
{
"binary_version": "5.11.0-1031.35",
"binary_name": "linux-modules-extra-5.11.0-1031-generic"
},
{
"binary_version": "5.11.0-1031.35",
"binary_name": "linux-riscv-5.11-headers-5.11.0-1031"
},
{
"binary_version": "5.11.0-1031.35",
"binary_name": "linux-riscv-5.11-tools-5.11.0-1031"
},
{
"binary_version": "5.11.0-1031.35",
"binary_name": "linux-tools-5.11.0-1031-generic"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "block-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "crypto-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "fat-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "firewire-core-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "fs-core-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "fs-secondary-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "input-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "ipmi-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "kernel-image-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "linux-buildinfo-5.8.0-29-generic"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "linux-headers-5.8.0-29-generic"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "linux-image-5.8.0-29-generic"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "linux-modules-5.8.0-29-generic"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "linux-modules-extra-5.8.0-29-generic"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "linux-riscv-5.8-headers-5.8.0-29"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "linux-riscv-5.8-tools-5.8.0-29"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "linux-tools-5.8.0-29-generic"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "linux-udebs-generic"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "md-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "message-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "mouse-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "multipath-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "nfs-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "nic-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "nic-shared-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "nic-usb-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "parport-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "pata-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "plip-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "ppp-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "sata-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "scsi-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "storage-core-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "usb-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "virtio-modules-5.8.0-29-generic-di"
},
{
"binary_version": "5.8.0-29.31~20.04.1",
"binary_name": "vlan-modules-5.8.0-29-generic-di"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-buildinfo-5.15.0-100-generic"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-buildinfo-5.15.0-100-generic-64k"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-buildinfo-5.15.0-100-generic-lpae"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-cloud-tools-5.15.0-100"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-cloud-tools-5.15.0-100-generic"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-cloud-tools-common"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-headers-5.15.0-100"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-headers-5.15.0-100-generic"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-headers-5.15.0-100-generic-64k"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-headers-5.15.0-100-generic-lpae"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-image-5.15.0-100-generic"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-image-5.15.0-100-generic-lpae"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-image-unsigned-5.15.0-100-generic"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-image-unsigned-5.15.0-100-generic-64k"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-modules-5.15.0-100-generic"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-modules-5.15.0-100-generic-64k"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-modules-5.15.0-100-generic-lpae"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-modules-extra-5.15.0-100-generic"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-modules-iwlwifi-5.15.0-100-generic"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-source-5.15.0"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-tools-5.15.0-100"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-tools-5.15.0-100-generic"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-tools-5.15.0-100-generic-64k"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-tools-5.15.0-100-generic-lpae"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-tools-common"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-tools-host"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.19.0-1015.15~22.04.1",
"binary_name": "linux-allwinner-5.19-headers-5.19.0-1015"
},
{
"binary_version": "5.19.0-1015.15~22.04.1",
"binary_name": "linux-allwinner-5.19-tools-5.19.0-1015"
},
{
"binary_version": "5.19.0-1015.15~22.04.1",
"binary_name": "linux-buildinfo-5.19.0-1015-allwinner"
},
{
"binary_version": "5.19.0-1015.15~22.04.1",
"binary_name": "linux-headers-5.19.0-1015-allwinner"
},
{
"binary_version": "5.19.0-1015.15~22.04.1",
"binary_name": "linux-image-5.19.0-1015-allwinner"
},
{
"binary_version": "5.19.0-1015.15~22.04.1",
"binary_name": "linux-modules-5.19.0-1015-allwinner"
},
{
"binary_version": "5.19.0-1015.15~22.04.1",
"binary_name": "linux-modules-extra-5.19.0-1015-allwinner"
},
{
"binary_version": "5.19.0-1015.15~22.04.1",
"binary_name": "linux-tools-5.19.0-1015-allwinner"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.15.0-1056.61",
"binary_name": "linux-aws-cloud-tools-5.15.0-1056"
},
{
"binary_version": "5.15.0-1056.61",
"binary_name": "linux-aws-headers-5.15.0-1056"
},
{
"binary_version": "5.15.0-1056.61",
"binary_name": "linux-aws-tools-5.15.0-1056"
},
{
"binary_version": "5.15.0-1056.61",
"binary_name": "linux-buildinfo-5.15.0-1056-aws"
},
{
"binary_version": "5.15.0-1056.61",
"binary_name": "linux-cloud-tools-5.15.0-1056-aws"
},
{
"binary_version": "5.15.0-1056.61",
"binary_name": "linux-headers-5.15.0-1056-aws"
},
{
"binary_version": "5.15.0-1056.61",
"binary_name": "linux-image-unsigned-5.15.0-1056-aws"
},
{
"binary_version": "5.15.0-1056.61",
"binary_name": "linux-modules-5.15.0-1056-aws"
},
{
"binary_version": "5.15.0-1056.61",
"binary_name": "linux-modules-extra-5.15.0-1056-aws"
},
{
"binary_version": "5.15.0-1056.61",
"binary_name": "linux-tools-5.15.0-1056-aws"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.19.0-1029.30~22.04.1",
"binary_name": "linux-aws-5.19-cloud-tools-5.19.0-1029"
},
{
"binary_version": "5.19.0-1029.30~22.04.1",
"binary_name": "linux-aws-5.19-headers-5.19.0-1029"
},
{
"binary_version": "5.19.0-1029.30~22.04.1",
"binary_name": "linux-aws-5.19-tools-5.19.0-1029"
},
{
"binary_version": "5.19.0-1029.30~22.04.1",
"binary_name": "linux-buildinfo-5.19.0-1029-aws"
},
{
"binary_version": "5.19.0-1029.30~22.04.1",
"binary_name": "linux-cloud-tools-5.19.0-1029-aws"
},
{
"binary_version": "5.19.0-1029.30~22.04.1",
"binary_name": "linux-headers-5.19.0-1029-aws"
},
{
"binary_version": "5.19.0-1029.30~22.04.1",
"binary_name": "linux-image-unsigned-5.19.0-1029-aws"
},
{
"binary_version": "5.19.0-1029.30~22.04.1",
"binary_name": "linux-modules-5.19.0-1029-aws"
},
{
"binary_version": "5.19.0-1029.30~22.04.1",
"binary_name": "linux-modules-extra-5.19.0-1029-aws"
},
{
"binary_version": "5.19.0-1029.30~22.04.1",
"binary_name": "linux-tools-5.19.0-1029-aws"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-aws-6.2-cloud-tools-6.2.0-1018"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-aws-6.2-headers-6.2.0-1018"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-aws-6.2-tools-6.2.0-1018"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-buildinfo-6.2.0-1018-aws"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-cloud-tools-6.2.0-1018-aws"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-headers-6.2.0-1018-aws"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-image-unsigned-6.2.0-1018-aws"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-modules-6.2.0-1018-aws"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-modules-extra-6.2.0-1018-aws"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-tools-6.2.0-1018-aws"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "6.5.0-1024.24~22.04.1",
"binary_name": "linux-aws-6.5-cloud-tools-6.5.0-1024"
},
{
"binary_version": "6.5.0-1024.24~22.04.1",
"binary_name": "linux-aws-6.5-headers-6.5.0-1024"
},
{
"binary_version": "6.5.0-1024.24~22.04.1",
"binary_name": "linux-aws-6.5-tools-6.5.0-1024"
},
{
"binary_version": "6.5.0-1024.24~22.04.1",
"binary_name": "linux-buildinfo-6.5.0-1024-aws"
},
{
"binary_version": "6.5.0-1024.24~22.04.1",
"binary_name": "linux-cloud-tools-6.5.0-1024-aws"
},
{
"binary_version": "6.5.0-1024.24~22.04.1",
"binary_name": "linux-headers-6.5.0-1024-aws"
},
{
"binary_version": "6.5.0-1024.24~22.04.1",
"binary_name": "linux-image-unsigned-6.5.0-1024-aws"
},
{
"binary_version": "6.5.0-1024.24~22.04.1",
"binary_name": "linux-modules-6.5.0-1024-aws"
},
{
"binary_version": "6.5.0-1024.24~22.04.1",
"binary_name": "linux-modules-extra-6.5.0-1024-aws"
},
{
"binary_version": "6.5.0-1024.24~22.04.1",
"binary_name": "linux-tools-6.5.0-1024-aws"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.15.0-1058.66",
"binary_name": "linux-azure-cloud-tools-5.15.0-1058"
},
{
"binary_version": "5.15.0-1058.66",
"binary_name": "linux-azure-headers-5.15.0-1058"
},
{
"binary_version": "5.15.0-1058.66",
"binary_name": "linux-azure-tools-5.15.0-1058"
},
{
"binary_version": "5.15.0-1058.66",
"binary_name": "linux-buildinfo-5.15.0-1058-azure"
},
{
"binary_version": "5.15.0-1058.66",
"binary_name": "linux-cloud-tools-5.15.0-1058-azure"
},
{
"binary_version": "5.15.0-1058.66",
"binary_name": "linux-headers-5.15.0-1058-azure"
},
{
"binary_version": "5.15.0-1058.66",
"binary_name": "linux-image-unsigned-5.15.0-1058-azure"
},
{
"binary_version": "5.15.0-1058.66",
"binary_name": "linux-modules-5.15.0-1058-azure"
},
{
"binary_version": "5.15.0-1058.66",
"binary_name": "linux-modules-extra-5.15.0-1058-azure"
},
{
"binary_version": "5.15.0-1058.66",
"binary_name": "linux-modules-iwlwifi-5.15.0-1058-azure"
},
{
"binary_version": "5.15.0-1058.66",
"binary_name": "linux-tools-5.15.0-1058-azure"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.19.0-1027.30~22.04.2",
"binary_name": "linux-azure-5.19-cloud-tools-5.19.0-1027"
},
{
"binary_version": "5.19.0-1027.30~22.04.2",
"binary_name": "linux-azure-5.19-headers-5.19.0-1027"
},
{
"binary_version": "5.19.0-1027.30~22.04.2",
"binary_name": "linux-azure-5.19-tools-5.19.0-1027"
},
{
"binary_version": "5.19.0-1027.30~22.04.2",
"binary_name": "linux-buildinfo-5.19.0-1027-azure"
},
{
"binary_version": "5.19.0-1027.30~22.04.2",
"binary_name": "linux-cloud-tools-5.19.0-1027-azure"
},
{
"binary_version": "5.19.0-1027.30~22.04.2",
"binary_name": "linux-headers-5.19.0-1027-azure"
},
{
"binary_version": "5.19.0-1027.30~22.04.2",
"binary_name": "linux-image-unsigned-5.19.0-1027-azure"
},
{
"binary_version": "5.19.0-1027.30~22.04.2",
"binary_name": "linux-modules-5.19.0-1027-azure"
},
{
"binary_version": "5.19.0-1027.30~22.04.2",
"binary_name": "linux-modules-extra-5.19.0-1027-azure"
},
{
"binary_version": "5.19.0-1027.30~22.04.2",
"binary_name": "linux-tools-5.19.0-1027-azure"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "6.2.0-1019.19~22.04.1",
"binary_name": "linux-azure-6.2-cloud-tools-6.2.0-1019"
},
{
"binary_version": "6.2.0-1019.19~22.04.1",
"binary_name": "linux-azure-6.2-headers-6.2.0-1019"
},
{
"binary_version": "6.2.0-1019.19~22.04.1",
"binary_name": "linux-azure-6.2-tools-6.2.0-1019"
},
{
"binary_version": "6.2.0-1019.19~22.04.1",
"binary_name": "linux-buildinfo-6.2.0-1019-azure"
},
{
"binary_version": "6.2.0-1019.19~22.04.1",
"binary_name": "linux-cloud-tools-6.2.0-1019-azure"
},
{
"binary_version": "6.2.0-1019.19~22.04.1",
"binary_name": "linux-headers-6.2.0-1019-azure"
},
{
"binary_version": "6.2.0-1019.19~22.04.1",
"binary_name": "linux-image-unsigned-6.2.0-1019-azure"
},
{
"binary_version": "6.2.0-1019.19~22.04.1",
"binary_name": "linux-modules-6.2.0-1019-azure"
},
{
"binary_version": "6.2.0-1019.19~22.04.1",
"binary_name": "linux-modules-extra-6.2.0-1019-azure"
},
{
"binary_version": "6.2.0-1019.19~22.04.1",
"binary_name": "linux-tools-6.2.0-1019-azure"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "6.5.0-1025.26~22.04.1",
"binary_name": "linux-azure-6.5-cloud-tools-6.5.0-1025"
},
{
"binary_version": "6.5.0-1025.26~22.04.1",
"binary_name": "linux-azure-6.5-headers-6.5.0-1025"
},
{
"binary_version": "6.5.0-1025.26~22.04.1",
"binary_name": "linux-azure-6.5-tools-6.5.0-1025"
},
{
"binary_version": "6.5.0-1025.26~22.04.1",
"binary_name": "linux-buildinfo-6.5.0-1025-azure"
},
{
"binary_version": "6.5.0-1025.26~22.04.1",
"binary_name": "linux-cloud-tools-6.5.0-1025-azure"
},
{
"binary_version": "6.5.0-1025.26~22.04.1",
"binary_name": "linux-headers-6.5.0-1025-azure"
},
{
"binary_version": "6.5.0-1025.26~22.04.1",
"binary_name": "linux-image-unsigned-6.5.0-1025-azure"
},
{
"binary_version": "6.5.0-1025.26~22.04.1",
"binary_name": "linux-modules-6.5.0-1025-azure"
},
{
"binary_version": "6.5.0-1025.26~22.04.1",
"binary_name": "linux-modules-extra-6.5.0-1025-azure"
},
{
"binary_version": "6.5.0-1025.26~22.04.1",
"binary_name": "linux-tools-6.5.0-1025-azure"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.15.0-1058.66.1",
"binary_name": "linux-image-unsigned-5.15.0-1058-azure-fde"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.19.0-1027.30~22.04.2.1",
"binary_name": "linux-image-unsigned-5.19.0-1027-azure-fde"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "6.2.0-1019.19~22.04.1.1",
"binary_name": "linux-image-unsigned-6.2.0-1019-azure-fde"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "6.8.0-1053.60~22.04.1",
"binary_name": "linux-azure-fde-6.8-cloud-tools-6.8.0-1053"
},
{
"binary_version": "6.8.0-1053.60~22.04.1",
"binary_name": "linux-azure-fde-6.8-headers-6.8.0-1053"
},
{
"binary_version": "6.8.0-1053.60~22.04.1",
"binary_name": "linux-azure-fde-6.8-tools-6.8.0-1053"
},
{
"binary_version": "6.8.0-1053.60~22.04.1",
"binary_name": "linux-buildinfo-6.8.0-1053-azure-fde"
},
{
"binary_version": "6.8.0-1053.60~22.04.1",
"binary_name": "linux-cloud-tools-6.8.0-1053-azure-fde"
},
{
"binary_version": "6.8.0-1053.60~22.04.1",
"binary_name": "linux-headers-6.8.0-1053-azure-fde"
},
{
"binary_version": "6.8.0-1053.60~22.04.1",
"binary_name": "linux-image-unsigned-6.8.0-1053-azure-fde"
},
{
"binary_version": "6.8.0-1053.60~22.04.1",
"binary_name": "linux-modules-6.8.0-1053-azure-fde"
},
{
"binary_version": "6.8.0-1053.60~22.04.1",
"binary_name": "linux-modules-extra-6.8.0-1053-azure-fde"
},
{
"binary_version": "6.8.0-1053.60~22.04.1",
"binary_name": "linux-modules-involflt-6.8.0-1053-azure-fde"
},
{
"binary_version": "6.8.0-1053.60~22.04.1",
"binary_name": "linux-modules-iwlwifi-6.8.0-1053-azure-fde"
},
{
"binary_version": "6.8.0-1053.60~22.04.1",
"binary_name": "linux-tools-6.8.0-1053-azure-fde"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.15.0-1053.61",
"binary_name": "linux-buildinfo-5.15.0-1053-gcp"
},
{
"binary_version": "5.15.0-1053.61",
"binary_name": "linux-gcp-headers-5.15.0-1053"
},
{
"binary_version": "5.15.0-1053.61",
"binary_name": "linux-gcp-tools-5.15.0-1053"
},
{
"binary_version": "5.15.0-1053.61",
"binary_name": "linux-headers-5.15.0-1053-gcp"
},
{
"binary_version": "5.15.0-1053.61",
"binary_name": "linux-image-unsigned-5.15.0-1053-gcp"
},
{
"binary_version": "5.15.0-1053.61",
"binary_name": "linux-modules-5.15.0-1053-gcp"
},
{
"binary_version": "5.15.0-1053.61",
"binary_name": "linux-modules-extra-5.15.0-1053-gcp"
},
{
"binary_version": "5.15.0-1053.61",
"binary_name": "linux-tools-5.15.0-1053-gcp"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.19.0-1030.32~22.04.1",
"binary_name": "linux-buildinfo-5.19.0-1030-gcp"
},
{
"binary_version": "5.19.0-1030.32~22.04.1",
"binary_name": "linux-gcp-5.19-headers-5.19.0-1030"
},
{
"binary_version": "5.19.0-1030.32~22.04.1",
"binary_name": "linux-gcp-5.19-tools-5.19.0-1030"
},
{
"binary_version": "5.19.0-1030.32~22.04.1",
"binary_name": "linux-headers-5.19.0-1030-gcp"
},
{
"binary_version": "5.19.0-1030.32~22.04.1",
"binary_name": "linux-image-unsigned-5.19.0-1030-gcp"
},
{
"binary_version": "5.19.0-1030.32~22.04.1",
"binary_name": "linux-modules-5.19.0-1030-gcp"
},
{
"binary_version": "5.19.0-1030.32~22.04.1",
"binary_name": "linux-modules-extra-5.19.0-1030-gcp"
},
{
"binary_version": "5.19.0-1030.32~22.04.1",
"binary_name": "linux-tools-5.19.0-1030-gcp"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "6.2.0-1021.23~22.04.1",
"binary_name": "linux-buildinfo-6.2.0-1021-gcp"
},
{
"binary_version": "6.2.0-1021.23~22.04.1",
"binary_name": "linux-gcp-6.2-headers-6.2.0-1021"
},
{
"binary_version": "6.2.0-1021.23~22.04.1",
"binary_name": "linux-gcp-6.2-tools-6.2.0-1021"
},
{
"binary_version": "6.2.0-1021.23~22.04.1",
"binary_name": "linux-headers-6.2.0-1021-gcp"
},
{
"binary_version": "6.2.0-1021.23~22.04.1",
"binary_name": "linux-image-unsigned-6.2.0-1021-gcp"
},
{
"binary_version": "6.2.0-1021.23~22.04.1",
"binary_name": "linux-modules-6.2.0-1021-gcp"
},
{
"binary_version": "6.2.0-1021.23~22.04.1",
"binary_name": "linux-modules-extra-6.2.0-1021-gcp"
},
{
"binary_version": "6.2.0-1021.23~22.04.1",
"binary_name": "linux-tools-6.2.0-1021-gcp"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "6.5.0-1025.27~22.04.1",
"binary_name": "linux-buildinfo-6.5.0-1025-gcp"
},
{
"binary_version": "6.5.0-1025.27~22.04.1",
"binary_name": "linux-gcp-6.5-headers-6.5.0-1025"
},
{
"binary_version": "6.5.0-1025.27~22.04.1",
"binary_name": "linux-gcp-6.5-tools-6.5.0-1025"
},
{
"binary_version": "6.5.0-1025.27~22.04.1",
"binary_name": "linux-headers-6.5.0-1025-gcp"
},
{
"binary_version": "6.5.0-1025.27~22.04.1",
"binary_name": "linux-image-unsigned-6.5.0-1025-gcp"
},
{
"binary_version": "6.5.0-1025.27~22.04.1",
"binary_name": "linux-modules-6.5.0-1025-gcp"
},
{
"binary_version": "6.5.0-1025.27~22.04.1",
"binary_name": "linux-modules-extra-6.5.0-1025-gcp"
},
{
"binary_version": "6.5.0-1025.27~22.04.1",
"binary_name": "linux-modules-iwlwifi-6.5.0-1025-gcp"
},
{
"binary_version": "6.5.0-1025.27~22.04.1",
"binary_name": "linux-tools-6.5.0-1025-gcp"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"binaries": [
{
"binary_version": "5.15.0-1052.57",
"binary_name": "linux-buildinfo-5.15.0-1052-gke"
},
{
"binary_version": "5.15.0-1052.57",
"binary_name": "linux-gke-headers-5.15.0-1052"
},
{
"binary_version": "5.15.0-1052.57",
"binary_name": "linux-gke-tools-5.15.0-1052"
},
{
"binary_version": "5.15.0-1052.57",
"binary_name": "linux-headers-5.15.0-1052-gke"
},
{
"binary_version": "5.15.0-1052.57",
"binary_name": "linux-image-unsigned-5.15.0-1052-gke"
},
{
"binary_version": "5.15.0-1052.57",
"binary_name": "linux-modules-5.15.0-1052-gke"
},
{
"binary_version": "5.15.0-1052.57",
"binary_name": "linux-modules-extra-5.15.0-1052-gke"
},
{
"binary_version": "5.15.0-1052.57",
"binary_name": "linux-modules-iwlwifi-5.15.0-1052-gke"
},
{
"binary_version": "5.15.0-1052.57",
"binary_name": "linux-tools-5.15.0-1052-gke"
}
]
}{
"binaries": [
{
"binary_version": "5.15.0-1038.44",
"binary_name": "linux-buildinfo-5.15.0-1038-gkeop"
},
{
"binary_version": "5.15.0-1038.44",
"binary_name": "linux-cloud-tools-5.15.0-1038-gkeop"
},
{
"binary_version": "5.15.0-1038.44",
"binary_name": "linux-gkeop-cloud-tools-5.15.0-1038"
},
{
"binary_version": "5.15.0-1038.44",
"binary_name": "linux-gkeop-headers-5.15.0-1038"
},
{
"binary_version": "5.15.0-1038.44",
"binary_name": "linux-gkeop-tools-5.15.0-1038"
},
{
"binary_version": "5.15.0-1038.44",
"binary_name": "linux-headers-5.15.0-1038-gkeop"
},
{
"binary_version": "5.15.0-1038.44",
"binary_name": "linux-image-unsigned-5.15.0-1038-gkeop"
},
{
"binary_version": "5.15.0-1038.44",
"binary_name": "linux-modules-5.15.0-1038-gkeop"
},
{
"binary_version": "5.15.0-1038.44",
"binary_name": "linux-modules-extra-5.15.0-1038-gkeop"
},
{
"binary_version": "5.15.0-1038.44",
"binary_name": "linux-tools-5.15.0-1038-gkeop"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-buildinfo-5.19.0-50-generic"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-buildinfo-5.19.0-50-generic-64k"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-buildinfo-5.19.0-50-generic-lpae"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-cloud-tools-5.19.0-50-generic"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-headers-5.19.0-50-generic"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-headers-5.19.0-50-generic-64k"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-headers-5.19.0-50-generic-lpae"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-hwe-5.19-cloud-tools-5.19.0-50"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-hwe-5.19-cloud-tools-common"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-hwe-5.19-headers-5.19.0-50"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-hwe-5.19-tools-5.19.0-50"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-hwe-5.19-tools-common"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-hwe-5.19-tools-host"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-image-5.19.0-50-generic"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-image-5.19.0-50-generic-lpae"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-image-unsigned-5.19.0-50-generic"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-image-unsigned-5.19.0-50-generic-64k"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-modules-5.19.0-50-generic"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-modules-5.19.0-50-generic-64k"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-modules-5.19.0-50-generic-lpae"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-modules-extra-5.19.0-50-generic"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-modules-ipu6-5.19.0-50-generic"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-modules-ivsc-5.19.0-50-generic"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-modules-iwlwifi-5.19.0-50-generic"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-source-5.19.0"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-tools-5.19.0-50-generic"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-tools-5.19.0-50-generic-64k"
},
{
"binary_version": "5.19.0-50.50",
"binary_name": "linux-tools-5.19.0-50-generic-lpae"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-buildinfo-6.2.0-39-generic"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-buildinfo-6.2.0-39-generic-64k"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-buildinfo-6.2.0-39-generic-lpae"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-cloud-tools-6.2.0-39-generic"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-headers-6.2.0-39-generic"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-headers-6.2.0-39-generic-64k"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-headers-6.2.0-39-generic-lpae"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-hwe-6.2-cloud-tools-6.2.0-39"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-hwe-6.2-cloud-tools-common"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-hwe-6.2-headers-6.2.0-39"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-hwe-6.2-tools-6.2.0-39"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-hwe-6.2-tools-common"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-hwe-6.2-tools-host"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-image-6.2.0-39-generic"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-image-6.2.0-39-generic-lpae"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-image-unsigned-6.2.0-39-generic"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-image-unsigned-6.2.0-39-generic-64k"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-modules-6.2.0-39-generic"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-modules-6.2.0-39-generic-64k"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-modules-6.2.0-39-generic-lpae"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-modules-extra-6.2.0-39-generic"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-modules-ipu6-6.2.0-39-generic"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-modules-ivsc-6.2.0-39-generic"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-modules-iwlwifi-6.2.0-39-generic"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-source-6.2.0"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-tools-6.2.0-39-generic"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-tools-6.2.0-39-generic-64k"
},
{
"binary_version": "6.2.0-39.40~22.04.1",
"binary_name": "linux-tools-6.2.0-39-generic-lpae"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-buildinfo-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-buildinfo-6.5.0-45-generic-64k"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-cloud-tools-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-headers-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-headers-6.5.0-45-generic-64k"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-hwe-6.5-cloud-tools-6.5.0-45"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-hwe-6.5-cloud-tools-common"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-hwe-6.5-headers-6.5.0-45"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-hwe-6.5-tools-6.5.0-45"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-hwe-6.5-tools-common"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-hwe-6.5-tools-host"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-image-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-image-unsigned-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-image-unsigned-6.5.0-45-generic-64k"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-modules-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-modules-6.5.0-45-generic-64k"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-modules-extra-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-modules-ipu6-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-modules-ivsc-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-modules-iwlwifi-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-source-6.5.0"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-tools-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45~22.04.1",
"binary_name": "linux-tools-6.5.0-45-generic-64k"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"binaries": [
{
"binary_version": "5.15.0-1048.51",
"binary_name": "linux-buildinfo-5.15.0-1048-ibm"
},
{
"binary_version": "5.15.0-1048.51",
"binary_name": "linux-headers-5.15.0-1048-ibm"
},
{
"binary_version": "5.15.0-1048.51",
"binary_name": "linux-ibm-cloud-tools-common"
},
{
"binary_version": "5.15.0-1048.51",
"binary_name": "linux-ibm-headers-5.15.0-1048"
},
{
"binary_version": "5.15.0-1048.51",
"binary_name": "linux-ibm-source-5.15.0"
},
{
"binary_version": "5.15.0-1048.51",
"binary_name": "linux-ibm-tools-5.15.0-1048"
},
{
"binary_version": "5.15.0-1048.51",
"binary_name": "linux-ibm-tools-common"
},
{
"binary_version": "5.15.0-1048.51",
"binary_name": "linux-image-unsigned-5.15.0-1048-ibm"
},
{
"binary_version": "5.15.0-1048.51",
"binary_name": "linux-modules-5.15.0-1048-ibm"
},
{
"binary_version": "5.15.0-1048.51",
"binary_name": "linux-modules-extra-5.15.0-1048-ibm"
},
{
"binary_version": "5.15.0-1048.51",
"binary_name": "linux-tools-5.15.0-1048-ibm"
}
]
}{
"binaries": [
{
"binary_version": "5.15.0-1050.56",
"binary_name": "linux-buildinfo-5.15.0-1050-intel-iotg"
},
{
"binary_version": "5.15.0-1050.56",
"binary_name": "linux-cloud-tools-5.15.0-1050-intel-iotg"
},
{
"binary_version": "5.15.0-1050.56",
"binary_name": "linux-headers-5.15.0-1050-intel-iotg"
},
{
"binary_version": "5.15.0-1050.56",
"binary_name": "linux-image-unsigned-5.15.0-1050-intel-iotg"
},
{
"binary_version": "5.15.0-1050.56",
"binary_name": "linux-intel-iotg-cloud-tools-5.15.0-1050"
},
{
"binary_version": "5.15.0-1050.56",
"binary_name": "linux-intel-iotg-cloud-tools-common"
},
{
"binary_version": "5.15.0-1050.56",
"binary_name": "linux-intel-iotg-headers-5.15.0-1050"
},
{
"binary_version": "5.15.0-1050.56",
"binary_name": "linux-intel-iotg-tools-5.15.0-1050"
},
{
"binary_version": "5.15.0-1050.56",
"binary_name": "linux-intel-iotg-tools-common"
},
{
"binary_version": "5.15.0-1050.56",
"binary_name": "linux-intel-iotg-tools-host"
},
{
"binary_version": "5.15.0-1050.56",
"binary_name": "linux-modules-5.15.0-1050-intel-iotg"
},
{
"binary_version": "5.15.0-1050.56",
"binary_name": "linux-modules-extra-5.15.0-1050-intel-iotg"
},
{
"binary_version": "5.15.0-1050.56",
"binary_name": "linux-modules-iwlwifi-5.15.0-1050-intel-iotg"
},
{
"binary_version": "5.15.0-1050.56",
"binary_name": "linux-tools-5.15.0-1050-intel-iotg"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.15.0-1052.57",
"binary_name": "linux-buildinfo-5.15.0-1052-kvm"
},
{
"binary_version": "5.15.0-1052.57",
"binary_name": "linux-headers-5.15.0-1052-kvm"
},
{
"binary_version": "5.15.0-1052.57",
"binary_name": "linux-image-unsigned-5.15.0-1052-kvm"
},
{
"binary_version": "5.15.0-1052.57",
"binary_name": "linux-kvm-headers-5.15.0-1052"
},
{
"binary_version": "5.15.0-1052.57",
"binary_name": "linux-kvm-tools-5.15.0-1052"
},
{
"binary_version": "5.15.0-1052.57",
"binary_name": "linux-modules-5.15.0-1052-kvm"
},
{
"binary_version": "5.15.0-1052.57",
"binary_name": "linux-tools-5.15.0-1052-kvm"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-buildinfo-5.15.0-100-lowlatency"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-buildinfo-5.15.0-100-lowlatency-64k"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-cloud-tools-5.15.0-100-lowlatency"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-headers-5.15.0-100-lowlatency"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-headers-5.15.0-100-lowlatency-64k"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-image-unsigned-5.15.0-100-lowlatency"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-image-unsigned-5.15.0-100-lowlatency-64k"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-lowlatency-cloud-tools-5.15.0-100"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-lowlatency-cloud-tools-common"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-lowlatency-headers-5.15.0-100"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-lowlatency-tools-5.15.0-100"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-lowlatency-tools-common"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-lowlatency-tools-host"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-modules-5.15.0-100-lowlatency"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-modules-5.15.0-100-lowlatency-64k"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-modules-iwlwifi-5.15.0-100-lowlatency"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-tools-5.15.0-100-lowlatency"
},
{
"binary_version": "5.15.0-100.110",
"binary_name": "linux-tools-5.15.0-100-lowlatency-64k"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-buildinfo-5.19.0-1030-lowlatency"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-buildinfo-5.19.0-1030-lowlatency-64k"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-cloud-tools-5.19.0-1030-lowlatency"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-headers-5.19.0-1030-lowlatency"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-headers-5.19.0-1030-lowlatency-64k"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-image-unsigned-5.19.0-1030-lowlatency"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-image-unsigned-5.19.0-1030-lowlatency-64k"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-lowlatency-hwe-5.19-cloud-tools-5.19.0-1030"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-lowlatency-hwe-5.19-cloud-tools-common"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-lowlatency-hwe-5.19-headers-5.19.0-1030"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-lowlatency-hwe-5.19-tools-5.19.0-1030"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-lowlatency-hwe-5.19-tools-common"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-lowlatency-hwe-5.19-tools-host"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-modules-5.19.0-1030-lowlatency"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-modules-5.19.0-1030-lowlatency-64k"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-modules-ipu6-5.19.0-1030-lowlatency"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-modules-ivsc-5.19.0-1030-lowlatency"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-modules-iwlwifi-5.19.0-1030-lowlatency"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-tools-5.19.0-1030-lowlatency"
},
{
"binary_version": "5.19.0-1030.30",
"binary_name": "linux-tools-5.19.0-1030-lowlatency-64k"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-buildinfo-6.2.0-1018-lowlatency"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-buildinfo-6.2.0-1018-lowlatency-64k"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-cloud-tools-6.2.0-1018-lowlatency"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-headers-6.2.0-1018-lowlatency"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-headers-6.2.0-1018-lowlatency-64k"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-image-unsigned-6.2.0-1018-lowlatency"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-image-unsigned-6.2.0-1018-lowlatency-64k"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.2-cloud-tools-6.2.0-1018"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.2-cloud-tools-common"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.2-headers-6.2.0-1018"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.2-tools-6.2.0-1018"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.2-tools-common"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.2-tools-host"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-modules-6.2.0-1018-lowlatency"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-modules-6.2.0-1018-lowlatency-64k"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-modules-ipu6-6.2.0-1018-lowlatency"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-modules-ivsc-6.2.0-1018-lowlatency"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-modules-iwlwifi-6.2.0-1018-lowlatency"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-tools-6.2.0-1018-lowlatency"
},
{
"binary_version": "6.2.0-1018.18~22.04.1",
"binary_name": "linux-tools-6.2.0-1018-lowlatency-64k"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-buildinfo-6.5.0-45-lowlatency"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-buildinfo-6.5.0-45-lowlatency-64k"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-cloud-tools-6.5.0-45-lowlatency"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-headers-6.5.0-45-lowlatency"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-headers-6.5.0-45-lowlatency-64k"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-image-unsigned-6.5.0-45-lowlatency"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-image-unsigned-6.5.0-45-lowlatency-64k"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.5-cloud-tools-6.5.0-45"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.5-cloud-tools-common"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.5-headers-6.5.0-45"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.5-lib-rust-6.5.0-45-lowlatency"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.5-tools-6.5.0-45"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.5-tools-common"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-lowlatency-hwe-6.5-tools-host"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-modules-6.5.0-45-lowlatency"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-modules-6.5.0-45-lowlatency-64k"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-modules-iwlwifi-6.5.0-45-lowlatency"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-tools-6.5.0-45-lowlatency"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-tools-6.5.0-45-lowlatency-64k"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"availability": "No subscription required",
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"binaries": [
{
"binary_version": "5.15.0-1046.46",
"binary_name": "linux-buildinfo-5.15.0-1046-nvidia"
},
{
"binary_version": "5.15.0-1046.46",
"binary_name": "linux-buildinfo-5.15.0-1046-nvidia-lowlatency"
},
{
"binary_version": "5.15.0-1046.46",
"binary_name": "linux-cloud-tools-5.15.0-1046-nvidia"
},
{
"binary_version": "5.15.0-1046.46",
"binary_name": "linux-cloud-tools-5.15.0-1046-nvidia-lowlatency"
},
{
"binary_version": "5.15.0-1046.46",
"binary_name": "linux-headers-5.15.0-1046-nvidia"
},
{
"binary_version": "5.15.0-1046.46",
"binary_name": "linux-headers-5.15.0-1046-nvidia-lowlatency"
},
{
"binary_version": "5.15.0-1046.46",
"binary_name": "linux-image-unsigned-5.15.0-1046-nvidia"
},
{
"binary_version": "5.15.0-1046.46",
"binary_name": "linux-image-unsigned-5.15.0-1046-nvidia-lowlatency"
},
{
"binary_version": "5.15.0-1046.46",
"binary_name": "linux-modules-5.15.0-1046-nvidia"
},
{
"binary_version": "5.15.0-1046.46",
"binary_name": "linux-modules-5.15.0-1046-nvidia-lowlatency"
},
{
"binary_version": "5.15.0-1046.46",
"binary_name": "linux-modules-extra-5.15.0-1046-nvidia"
},
{
"binary_version": "5.15.0-1046.46",
"binary_name": "linux-modules-nvidia-fs-5.15.0-1046-nvidia"
},
{
"binary_version": "5.15.0-1046.46",
"binary_name": "linux-modules-nvidia-fs-5.15.0-1046-nvidia-lowlatency"
},
{
"binary_version": "5.15.0-1046.46",
"binary_name": "linux-nvidia-cloud-tools-5.15.0-1046"
},
{
"binary_version": "5.15.0-1046.46",
"binary_name": "linux-nvidia-cloud-tools-common"
},
{
"binary_version": "5.15.0-1046.46",
"binary_name": "linux-nvidia-headers-5.15.0-1046"
},
{
"binary_version": "5.15.0-1046.46",
"binary_name": "linux-nvidia-tools-5.15.0-1046"
},
{
"binary_version": "5.15.0-1046.46",
"binary_name": "linux-nvidia-tools-common"
},
{
"binary_version": "5.15.0-1046.46",
"binary_name": "linux-nvidia-tools-host"
},
{
"binary_version": "5.15.0-1046.46",
"binary_name": "linux-tools-5.15.0-1046-nvidia"
},
{
"binary_version": "5.15.0-1046.46",
"binary_name": "linux-tools-5.15.0-1046-nvidia-lowlatency"
}
]
}{
"binaries": [
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-buildinfo-6.2.0-1015-nvidia"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-buildinfo-6.2.0-1015-nvidia-64k"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-headers-6.2.0-1015-nvidia"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-headers-6.2.0-1015-nvidia-64k"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-image-unsigned-6.2.0-1015-nvidia"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-image-unsigned-6.2.0-1015-nvidia-64k"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-modules-6.2.0-1015-nvidia"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-modules-6.2.0-1015-nvidia-64k"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-modules-extra-6.2.0-1015-nvidia"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-modules-nvidia-fs-6.2.0-1015-nvidia"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-modules-nvidia-fs-6.2.0-1015-nvidia-64k"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-nvidia-6.2-headers-6.2.0-1015"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-nvidia-6.2-tools-6.2.0-1015"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-nvidia-6.2-tools-host"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-tools-6.2.0-1015-nvidia"
},
{
"binary_version": "6.2.0-1015.15",
"binary_name": "linux-tools-6.2.0-1015-nvidia-64k"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "6.5.0-1014.14",
"binary_name": "linux-buildinfo-6.5.0-1014-nvidia"
},
{
"binary_version": "6.5.0-1014.14",
"binary_name": "linux-buildinfo-6.5.0-1014-nvidia-64k"
},
{
"binary_version": "6.5.0-1014.14",
"binary_name": "linux-headers-6.5.0-1014-nvidia"
},
{
"binary_version": "6.5.0-1014.14",
"binary_name": "linux-headers-6.5.0-1014-nvidia-64k"
},
{
"binary_version": "6.5.0-1014.14",
"binary_name": "linux-image-unsigned-6.5.0-1014-nvidia"
},
{
"binary_version": "6.5.0-1014.14",
"binary_name": "linux-image-unsigned-6.5.0-1014-nvidia-64k"
},
{
"binary_version": "6.5.0-1014.14",
"binary_name": "linux-modules-6.5.0-1014-nvidia"
},
{
"binary_version": "6.5.0-1014.14",
"binary_name": "linux-modules-6.5.0-1014-nvidia-64k"
},
{
"binary_version": "6.5.0-1014.14",
"binary_name": "linux-modules-extra-6.5.0-1014-nvidia"
},
{
"binary_version": "6.5.0-1014.14",
"binary_name": "linux-modules-nvidia-fs-6.5.0-1014-nvidia"
},
{
"binary_version": "6.5.0-1014.14",
"binary_name": "linux-modules-nvidia-fs-6.5.0-1014-nvidia-64k"
},
{
"binary_version": "6.5.0-1014.14",
"binary_name": "linux-nvidia-6.5-headers-6.5.0-1014"
},
{
"binary_version": "6.5.0-1014.14",
"binary_name": "linux-nvidia-6.5-tools-6.5.0-1014"
},
{
"binary_version": "6.5.0-1014.14",
"binary_name": "linux-nvidia-6.5-tools-host"
},
{
"binary_version": "6.5.0-1014.14",
"binary_name": "linux-tools-6.5.0-1014-nvidia"
},
{
"binary_version": "6.5.0-1014.14",
"binary_name": "linux-tools-6.5.0-1014-nvidia-64k"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.15.0-1025.25",
"binary_name": "linux-buildinfo-5.15.0-1025-nvidia-tegra"
},
{
"binary_version": "5.15.0-1025.25",
"binary_name": "linux-buildinfo-5.15.0-1025-nvidia-tegra-rt"
},
{
"binary_version": "5.15.0-1025.25",
"binary_name": "linux-headers-5.15.0-1025-nvidia-tegra"
},
{
"binary_version": "5.15.0-1025.25",
"binary_name": "linux-headers-5.15.0-1025-nvidia-tegra-rt"
},
{
"binary_version": "5.15.0-1025.25",
"binary_name": "linux-image-unsigned-5.15.0-1025-nvidia-tegra"
},
{
"binary_version": "5.15.0-1025.25",
"binary_name": "linux-image-unsigned-5.15.0-1025-nvidia-tegra-rt"
},
{
"binary_version": "5.15.0-1025.25",
"binary_name": "linux-modules-5.15.0-1025-nvidia-tegra"
},
{
"binary_version": "5.15.0-1025.25",
"binary_name": "linux-modules-5.15.0-1025-nvidia-tegra-rt"
},
{
"binary_version": "5.15.0-1025.25",
"binary_name": "linux-modules-extra-5.15.0-1025-nvidia-tegra"
},
{
"binary_version": "5.15.0-1025.25",
"binary_name": "linux-nvidia-tegra-cloud-tools-common"
},
{
"binary_version": "5.15.0-1025.25",
"binary_name": "linux-nvidia-tegra-headers-5.15.0-1025"
},
{
"binary_version": "5.15.0-1025.25",
"binary_name": "linux-nvidia-tegra-tools-5.15.0-1025"
},
{
"binary_version": "5.15.0-1025.25",
"binary_name": "linux-nvidia-tegra-tools-common"
},
{
"binary_version": "5.15.0-1025.25",
"binary_name": "linux-nvidia-tegra-tools-host"
},
{
"binary_version": "5.15.0-1025.25",
"binary_name": "linux-tools-5.15.0-1025-nvidia-tegra"
},
{
"binary_version": "5.15.0-1025.25",
"binary_name": "linux-tools-5.15.0-1025-nvidia-tegra-rt"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.15.0-1012.12",
"binary_name": "linux-buildinfo-5.15.0-1012-nvidia-tegra-igx"
},
{
"binary_version": "5.15.0-1012.12",
"binary_name": "linux-buildinfo-5.15.0-1012-nvidia-tegra-igx-rt"
},
{
"binary_version": "5.15.0-1012.12",
"binary_name": "linux-headers-5.15.0-1012-nvidia-tegra-igx"
},
{
"binary_version": "5.15.0-1012.12",
"binary_name": "linux-headers-5.15.0-1012-nvidia-tegra-igx-rt"
},
{
"binary_version": "5.15.0-1012.12",
"binary_name": "linux-image-unsigned-5.15.0-1012-nvidia-tegra-igx"
},
{
"binary_version": "5.15.0-1012.12",
"binary_name": "linux-image-unsigned-5.15.0-1012-nvidia-tegra-igx-rt"
},
{
"binary_version": "5.15.0-1012.12",
"binary_name": "linux-modules-5.15.0-1012-nvidia-tegra-igx"
},
{
"binary_version": "5.15.0-1012.12",
"binary_name": "linux-modules-5.15.0-1012-nvidia-tegra-igx-rt"
},
{
"binary_version": "5.15.0-1012.12",
"binary_name": "linux-modules-extra-5.15.0-1012-nvidia-tegra-igx"
},
{
"binary_version": "5.15.0-1012.12",
"binary_name": "linux-nvidia-tegra-igx-cloud-tools-common"
},
{
"binary_version": "5.15.0-1012.12",
"binary_name": "linux-nvidia-tegra-igx-headers-5.15.0-1012"
},
{
"binary_version": "5.15.0-1012.12",
"binary_name": "linux-nvidia-tegra-igx-tools-5.15.0-1012"
},
{
"binary_version": "5.15.0-1012.12",
"binary_name": "linux-nvidia-tegra-igx-tools-common"
},
{
"binary_version": "5.15.0-1012.12",
"binary_name": "linux-nvidia-tegra-igx-tools-host"
},
{
"binary_version": "5.15.0-1012.12",
"binary_name": "linux-tools-5.15.0-1012-nvidia-tegra-igx"
},
{
"binary_version": "5.15.0-1012.12",
"binary_name": "linux-tools-5.15.0-1012-nvidia-tegra-igx-rt"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.17.0-1035.36",
"binary_name": "linux-buildinfo-5.17.0-1035-oem"
},
{
"binary_version": "5.17.0-1035.36",
"binary_name": "linux-headers-5.17.0-1035-oem"
},
{
"binary_version": "5.17.0-1035.36",
"binary_name": "linux-image-unsigned-5.17.0-1035-oem"
},
{
"binary_version": "5.17.0-1035.36",
"binary_name": "linux-modules-5.17.0-1035-oem"
},
{
"binary_version": "5.17.0-1035.36",
"binary_name": "linux-modules-ipu6-5.17.0-1035-oem"
},
{
"binary_version": "5.17.0-1035.36",
"binary_name": "linux-modules-ivsc-5.17.0-1035-oem"
},
{
"binary_version": "5.17.0-1035.36",
"binary_name": "linux-modules-iwlwifi-5.17.0-1035-oem"
},
{
"binary_version": "5.17.0-1035.36",
"binary_name": "linux-oem-5.17-headers-5.17.0-1035"
},
{
"binary_version": "5.17.0-1035.36",
"binary_name": "linux-oem-5.17-tools-5.17.0-1035"
},
{
"binary_version": "5.17.0-1035.36",
"binary_name": "linux-oem-5.17-tools-host"
},
{
"binary_version": "5.17.0-1035.36",
"binary_name": "linux-tools-5.17.0-1035-oem"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "6.0.0-1021.21",
"binary_name": "linux-buildinfo-6.0.0-1021-oem"
},
{
"binary_version": "6.0.0-1021.21",
"binary_name": "linux-headers-6.0.0-1021-oem"
},
{
"binary_version": "6.0.0-1021.21",
"binary_name": "linux-image-unsigned-6.0.0-1021-oem"
},
{
"binary_version": "6.0.0-1021.21",
"binary_name": "linux-modules-6.0.0-1021-oem"
},
{
"binary_version": "6.0.0-1021.21",
"binary_name": "linux-modules-ipu6-6.0.0-1021-oem"
},
{
"binary_version": "6.0.0-1021.21",
"binary_name": "linux-modules-ivsc-6.0.0-1021-oem"
},
{
"binary_version": "6.0.0-1021.21",
"binary_name": "linux-modules-iwlwifi-6.0.0-1021-oem"
},
{
"binary_version": "6.0.0-1021.21",
"binary_name": "linux-oem-6.0-headers-6.0.0-1021"
},
{
"binary_version": "6.0.0-1021.21",
"binary_name": "linux-oem-6.0-tools-6.0.0-1021"
},
{
"binary_version": "6.0.0-1021.21",
"binary_name": "linux-oem-6.0-tools-host"
},
{
"binary_version": "6.0.0-1021.21",
"binary_name": "linux-tools-6.0.0-1021-oem"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "6.1.0-1036.36",
"binary_name": "linux-buildinfo-6.1.0-1036-oem"
},
{
"binary_version": "6.1.0-1036.36",
"binary_name": "linux-headers-6.1.0-1036-oem"
},
{
"binary_version": "6.1.0-1036.36",
"binary_name": "linux-image-unsigned-6.1.0-1036-oem"
},
{
"binary_version": "6.1.0-1036.36",
"binary_name": "linux-modules-6.1.0-1036-oem"
},
{
"binary_version": "6.1.0-1036.36",
"binary_name": "linux-modules-ipu6-6.1.0-1036-oem"
},
{
"binary_version": "6.1.0-1036.36",
"binary_name": "linux-modules-ivsc-6.1.0-1036-oem"
},
{
"binary_version": "6.1.0-1036.36",
"binary_name": "linux-modules-iwlwifi-6.1.0-1036-oem"
},
{
"binary_version": "6.1.0-1036.36",
"binary_name": "linux-oem-6.1-headers-6.1.0-1036"
},
{
"binary_version": "6.1.0-1036.36",
"binary_name": "linux-oem-6.1-tools-6.1.0-1036"
},
{
"binary_version": "6.1.0-1036.36",
"binary_name": "linux-oem-6.1-tools-host"
},
{
"binary_version": "6.1.0-1036.36",
"binary_name": "linux-tools-6.1.0-1036-oem"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "6.5.0-1027.28",
"binary_name": "linux-buildinfo-6.5.0-1027-oem"
},
{
"binary_version": "6.5.0-1027.28",
"binary_name": "linux-headers-6.5.0-1027-oem"
},
{
"binary_version": "6.5.0-1027.28",
"binary_name": "linux-image-unsigned-6.5.0-1027-oem"
},
{
"binary_version": "6.5.0-1027.28",
"binary_name": "linux-modules-6.5.0-1027-oem"
},
{
"binary_version": "6.5.0-1027.28",
"binary_name": "linux-modules-ipu6-6.5.0-1027-oem"
},
{
"binary_version": "6.5.0-1027.28",
"binary_name": "linux-modules-ivsc-6.5.0-1027-oem"
},
{
"binary_version": "6.5.0-1027.28",
"binary_name": "linux-modules-iwlwifi-6.5.0-1027-oem"
},
{
"binary_version": "6.5.0-1027.28",
"binary_name": "linux-modules-usbio-6.5.0-1027-oem"
},
{
"binary_version": "6.5.0-1027.28",
"binary_name": "linux-oem-6.5-headers-6.5.0-1027"
},
{
"binary_version": "6.5.0-1027.28",
"binary_name": "linux-oem-6.5-lib-rust-6.5.0-1027-oem"
},
{
"binary_version": "6.5.0-1027.28",
"binary_name": "linux-oem-6.5-tools-6.5.0-1027"
},
{
"binary_version": "6.5.0-1027.28",
"binary_name": "linux-oem-6.5-tools-host"
},
{
"binary_version": "6.5.0-1027.28",
"binary_name": "linux-tools-6.5.0-1027-oem"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.15.0-1053.59",
"binary_name": "linux-buildinfo-5.15.0-1053-oracle"
},
{
"binary_version": "5.15.0-1053.59",
"binary_name": "linux-headers-5.15.0-1053-oracle"
},
{
"binary_version": "5.15.0-1053.59",
"binary_name": "linux-image-unsigned-5.15.0-1053-oracle"
},
{
"binary_version": "5.15.0-1053.59",
"binary_name": "linux-modules-5.15.0-1053-oracle"
},
{
"binary_version": "5.15.0-1053.59",
"binary_name": "linux-modules-extra-5.15.0-1053-oracle"
},
{
"binary_version": "5.15.0-1053.59",
"binary_name": "linux-oracle-headers-5.15.0-1053"
},
{
"binary_version": "5.15.0-1053.59",
"binary_name": "linux-oracle-tools-5.15.0-1053"
},
{
"binary_version": "5.15.0-1053.59",
"binary_name": "linux-tools-5.15.0-1053-oracle"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-buildinfo-6.5.0-1027-oracle"
},
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-buildinfo-6.5.0-1027-oracle-64k"
},
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-headers-6.5.0-1027-oracle"
},
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-headers-6.5.0-1027-oracle-64k"
},
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-image-unsigned-6.5.0-1027-oracle"
},
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-image-unsigned-6.5.0-1027-oracle-64k"
},
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-modules-6.5.0-1027-oracle"
},
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-modules-6.5.0-1027-oracle-64k"
},
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-modules-extra-6.5.0-1027-oracle"
},
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-modules-extra-6.5.0-1027-oracle-64k"
},
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-oracle-6.5-headers-6.5.0-1027"
},
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-oracle-6.5-tools-6.5.0-1027"
},
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-tools-6.5.0-1027-oracle"
},
{
"binary_version": "6.5.0-1027.27~22.04.1",
"binary_name": "linux-tools-6.5.0-1027-oracle-64k"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.15.0-1048.51",
"binary_name": "linux-buildinfo-5.15.0-1048-raspi"
},
{
"binary_version": "5.15.0-1048.51",
"binary_name": "linux-headers-5.15.0-1048-raspi"
},
{
"binary_version": "5.15.0-1048.51",
"binary_name": "linux-image-5.15.0-1048-raspi"
},
{
"binary_version": "5.15.0-1048.51",
"binary_name": "linux-modules-5.15.0-1048-raspi"
},
{
"binary_version": "5.15.0-1048.51",
"binary_name": "linux-modules-extra-5.15.0-1048-raspi"
},
{
"binary_version": "5.15.0-1048.51",
"binary_name": "linux-raspi-headers-5.15.0-1048"
},
{
"binary_version": "5.15.0-1048.51",
"binary_name": "linux-raspi-tools-5.15.0-1048"
},
{
"binary_version": "5.15.0-1048.51",
"binary_name": "linux-tools-5.15.0-1048-raspi"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "5.15.0-1032.35",
"binary_name": "linux-buildinfo-5.15.0-1032-realtime"
},
{
"binary_version": "5.15.0-1032.35",
"binary_name": "linux-cloud-tools-5.15.0-1032-realtime"
},
{
"binary_version": "5.15.0-1032.35",
"binary_name": "linux-headers-5.15.0-1032-realtime"
},
{
"binary_version": "5.15.0-1032.35",
"binary_name": "linux-image-unsigned-5.15.0-1032-realtime"
},
{
"binary_version": "5.15.0-1032.35",
"binary_name": "linux-modules-5.15.0-1032-realtime"
},
{
"binary_version": "5.15.0-1032.35",
"binary_name": "linux-modules-extra-5.15.0-1032-realtime"
},
{
"binary_version": "5.15.0-1032.35",
"binary_name": "linux-realtime-cloud-tools-5.15.0-1032"
},
{
"binary_version": "5.15.0-1032.35",
"binary_name": "linux-realtime-cloud-tools-common"
},
{
"binary_version": "5.15.0-1032.35",
"binary_name": "linux-realtime-headers-5.15.0-1032"
},
{
"binary_version": "5.15.0-1032.35",
"binary_name": "linux-realtime-tools-5.15.0-1032"
},
{
"binary_version": "5.15.0-1032.35",
"binary_name": "linux-realtime-tools-common"
},
{
"binary_version": "5.15.0-1032.35",
"binary_name": "linux-realtime-tools-host"
},
{
"binary_version": "5.15.0-1032.35",
"binary_name": "linux-tools-5.15.0-1032-realtime"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.15.0-1028.32",
"binary_name": "linux-buildinfo-5.15.0-1028-generic"
},
{
"binary_version": "5.15.0-1028.32",
"binary_name": "linux-headers-5.15.0-1028-generic"
},
{
"binary_version": "5.15.0-1028.32",
"binary_name": "linux-image-5.15.0-1028-generic"
},
{
"binary_version": "5.15.0-1028.32",
"binary_name": "linux-modules-5.15.0-1028-generic"
},
{
"binary_version": "5.15.0-1028.32",
"binary_name": "linux-modules-extra-5.15.0-1028-generic"
},
{
"binary_version": "5.15.0-1028.32",
"binary_name": "linux-riscv-headers-5.15.0-1028"
},
{
"binary_version": "5.15.0-1028.32",
"binary_name": "linux-riscv-tools-5.15.0-1028"
},
{
"binary_version": "5.15.0-1028.32",
"binary_name": "linux-tools-5.15.0-1028-generic"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.19.0-1021.23~22.04.1",
"binary_name": "linux-buildinfo-5.19.0-1021-generic"
},
{
"binary_version": "5.19.0-1021.23~22.04.1",
"binary_name": "linux-headers-5.19.0-1021-generic"
},
{
"binary_version": "5.19.0-1021.23~22.04.1",
"binary_name": "linux-image-5.19.0-1021-generic"
},
{
"binary_version": "5.19.0-1021.23~22.04.1",
"binary_name": "linux-modules-5.19.0-1021-generic"
},
{
"binary_version": "5.19.0-1021.23~22.04.1",
"binary_name": "linux-modules-extra-5.19.0-1021-generic"
},
{
"binary_version": "5.19.0-1021.23~22.04.1",
"binary_name": "linux-riscv-5.19-headers-5.19.0-1021"
},
{
"binary_version": "5.19.0-1021.23~22.04.1",
"binary_name": "linux-riscv-5.19-tools-5.19.0-1021"
},
{
"binary_version": "5.19.0-1021.23~22.04.1",
"binary_name": "linux-tools-5.19.0-1021-generic"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-buildinfo-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-headers-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-image-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-modules-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-modules-extra-6.5.0-45-generic"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-riscv-6.5-headers-6.5.0-45"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-riscv-6.5-tools-6.5.0-45"
},
{
"binary_version": "6.5.0-45.45.1~22.04.1",
"binary_name": "linux-tools-6.5.0-45-generic"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.19.0-1020.22~22.04.1",
"binary_name": "linux-buildinfo-5.19.0-1020-starfive"
},
{
"binary_version": "5.19.0-1020.22~22.04.1",
"binary_name": "linux-headers-5.19.0-1020-starfive"
},
{
"binary_version": "5.19.0-1020.22~22.04.1",
"binary_name": "linux-image-5.19.0-1020-starfive"
},
{
"binary_version": "5.19.0-1020.22~22.04.1",
"binary_name": "linux-modules-5.19.0-1020-starfive"
},
{
"binary_version": "5.19.0-1020.22~22.04.1",
"binary_name": "linux-modules-extra-5.19.0-1020-starfive"
},
{
"binary_version": "5.19.0-1020.22~22.04.1",
"binary_name": "linux-starfive-5.19-headers-5.19.0-1020"
},
{
"binary_version": "5.19.0-1020.22~22.04.1",
"binary_name": "linux-starfive-5.19-tools-5.19.0-1020"
},
{
"binary_version": "5.19.0-1020.22~22.04.1",
"binary_name": "linux-tools-5.19.0-1020-starfive"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "6.2.0-1009.10~22.04.1",
"binary_name": "linux-buildinfo-6.2.0-1009-starfive"
},
{
"binary_version": "6.2.0-1009.10~22.04.1",
"binary_name": "linux-headers-6.2.0-1009-starfive"
},
{
"binary_version": "6.2.0-1009.10~22.04.1",
"binary_name": "linux-image-6.2.0-1009-starfive"
},
{
"binary_version": "6.2.0-1009.10~22.04.1",
"binary_name": "linux-modules-6.2.0-1009-starfive"
},
{
"binary_version": "6.2.0-1009.10~22.04.1",
"binary_name": "linux-modules-extra-6.2.0-1009-starfive"
},
{
"binary_version": "6.2.0-1009.10~22.04.1",
"binary_name": "linux-starfive-6.2-headers-6.2.0-1009"
},
{
"binary_version": "6.2.0-1009.10~22.04.1",
"binary_name": "linux-starfive-6.2-tools-6.2.0-1009"
},
{
"binary_version": "6.2.0-1009.10~22.04.1",
"binary_name": "linux-tools-6.2.0-1009-starfive"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "6.5.0-1018.19~22.04.1",
"binary_name": "linux-buildinfo-6.5.0-1018-starfive"
},
{
"binary_version": "6.5.0-1018.19~22.04.1",
"binary_name": "linux-headers-6.5.0-1018-starfive"
},
{
"binary_version": "6.5.0-1018.19~22.04.1",
"binary_name": "linux-image-6.5.0-1018-starfive"
},
{
"binary_version": "6.5.0-1018.19~22.04.1",
"binary_name": "linux-modules-6.5.0-1018-starfive"
},
{
"binary_version": "6.5.0-1018.19~22.04.1",
"binary_name": "linux-modules-extra-6.5.0-1018-starfive"
},
{
"binary_version": "6.5.0-1018.19~22.04.1",
"binary_name": "linux-starfive-6.5-headers-6.5.0-1018"
},
{
"binary_version": "6.5.0-1018.19~22.04.1",
"binary_name": "linux-starfive-6.5-tools-6.5.0-1018"
},
{
"binary_version": "6.5.0-1018.19~22.04.1",
"binary_name": "linux-tools-6.5.0-1018-starfive"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.15.0-1030.34",
"binary_name": "linux-buildinfo-5.15.0-1030-xilinx-zynqmp"
},
{
"binary_version": "5.15.0-1030.34",
"binary_name": "linux-headers-5.15.0-1030-xilinx-zynqmp"
},
{
"binary_version": "5.15.0-1030.34",
"binary_name": "linux-image-5.15.0-1030-xilinx-zynqmp"
},
{
"binary_version": "5.15.0-1030.34",
"binary_name": "linux-modules-5.15.0-1030-xilinx-zynqmp"
},
{
"binary_version": "5.15.0-1030.34",
"binary_name": "linux-tools-5.15.0-1030-xilinx-zynqmp"
},
{
"binary_version": "5.15.0-1030.34",
"binary_name": "linux-xilinx-zynqmp-headers-5.15.0-1030"
},
{
"binary_version": "5.15.0-1030.34",
"binary_name": "linux-xilinx-zynqmp-tools-5.15.0-1030"
},
{
"binary_version": "5.15.0-1030.34",
"binary_name": "linux-xilinx-zynqmp-tools-common"
},
{
"binary_version": "5.15.0-1030.34",
"binary_name": "linux-xilinx-zynqmp-tools-host"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "6.8.0-1053.60",
"binary_name": "linux-azure-fde-cloud-tools-6.8.0-1053"
},
{
"binary_version": "6.8.0-1053.60",
"binary_name": "linux-azure-fde-headers-6.8.0-1053"
},
{
"binary_version": "6.8.0-1053.60",
"binary_name": "linux-azure-fde-tools-6.8.0-1053"
},
{
"binary_version": "6.8.0-1053.60",
"binary_name": "linux-buildinfo-6.8.0-1053-azure-fde"
},
{
"binary_version": "6.8.0-1053.60",
"binary_name": "linux-cloud-tools-6.8.0-1053-azure-fde"
},
{
"binary_version": "6.8.0-1053.60",
"binary_name": "linux-headers-6.8.0-1053-azure-fde"
},
{
"binary_version": "6.8.0-1053.60",
"binary_name": "linux-image-unsigned-6.8.0-1053-azure-fde"
},
{
"binary_version": "6.8.0-1053.60",
"binary_name": "linux-modules-6.8.0-1053-azure-fde"
},
{
"binary_version": "6.8.0-1053.60",
"binary_name": "linux-modules-extra-6.8.0-1053-azure-fde"
},
{
"binary_version": "6.8.0-1053.60",
"binary_name": "linux-modules-involflt-6.8.0-1053-azure-fde"
},
{
"binary_version": "6.8.0-1053.60",
"binary_name": "linux-modules-iwlwifi-6.8.0-1053-azure-fde"
},
{
"binary_version": "6.8.0-1053.60",
"binary_name": "linux-tools-6.8.0-1053-azure-fde"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "6.8.0-2019.20",
"binary_name": "linux-buildinfo-6.8.0-2019-raspi-realtime"
},
{
"binary_version": "6.8.0-2019.20",
"binary_name": "linux-headers-6.8.0-2019-raspi-realtime"
},
{
"binary_version": "6.8.0-2019.20",
"binary_name": "linux-image-6.8.0-2019-raspi-realtime"
},
{
"binary_version": "6.8.0-2019.20",
"binary_name": "linux-modules-6.8.0-2019-raspi-realtime"
},
{
"binary_version": "6.8.0-2019.20",
"binary_name": "linux-raspi-realtime-headers-6.8.0-2019"
},
{
"binary_version": "6.8.0-2019.20",
"binary_name": "linux-raspi-realtime-tools-6.8.0-2019"
},
{
"binary_version": "6.8.0-2019.20",
"binary_name": "linux-tools-6.8.0-2019-raspi-realtime"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "7.0.0-1006.6",
"binary_name": "linux-buildinfo-7.0.0-1006-nvidia"
},
{
"binary_version": "7.0.0-1006.6",
"binary_name": "linux-buildinfo-7.0.0-1006-nvidia-64k"
},
{
"binary_version": "7.0.0-1006.6",
"binary_name": "linux-headers-7.0.0-1006-nvidia"
},
{
"binary_version": "7.0.0-1006.6",
"binary_name": "linux-headers-7.0.0-1006-nvidia-64k"
},
{
"binary_version": "7.0.0-1006.6",
"binary_name": "linux-image-unsigned-7.0.0-1006-nvidia"
},
{
"binary_version": "7.0.0-1006.6",
"binary_name": "linux-image-unsigned-7.0.0-1006-nvidia-64k"
},
{
"binary_version": "7.0.0-1006.6",
"binary_name": "linux-modules-7.0.0-1006-nvidia"
},
{
"binary_version": "7.0.0-1006.6",
"binary_name": "linux-modules-7.0.0-1006-nvidia-64k"
},
{
"binary_version": "7.0.0-1006.6",
"binary_name": "linux-nvidia-headers-7.0.0-1006"
},
{
"binary_version": "7.0.0-1006.6",
"binary_name": "linux-nvidia-tools-7.0.0-1006"
},
{
"binary_version": "7.0.0-1006.6",
"binary_name": "linux-tools-7.0.0-1006-nvidia"
},
{
"binary_version": "7.0.0-1006.6",
"binary_name": "linux-tools-7.0.0-1006-nvidia-64k"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.15.0-1037.39",
"binary_name": "linux-bluefield-cloud-tools-common"
},
{
"binary_version": "5.15.0-1037.39",
"binary_name": "linux-bluefield-headers-5.15.0-1037"
},
{
"binary_version": "5.15.0-1037.39",
"binary_name": "linux-bluefield-tools-5.15.0-1037"
},
{
"binary_version": "5.15.0-1037.39",
"binary_name": "linux-bluefield-tools-host"
},
{
"binary_version": "5.15.0-1037.39",
"binary_name": "linux-buildinfo-5.15.0-1037-bluefield"
},
{
"binary_version": "5.15.0-1037.39",
"binary_name": "linux-headers-5.15.0-1037-bluefield"
},
{
"binary_version": "5.15.0-1037.39",
"binary_name": "linux-image-unsigned-5.15.0-1037-bluefield"
},
{
"binary_version": "5.15.0-1037.39",
"binary_name": "linux-modules-5.15.0-1037-bluefield"
},
{
"binary_version": "5.15.0-1037.39",
"binary_name": "linux-modules-extra-5.15.0-1037-bluefield"
},
{
"binary_version": "5.15.0-1037.39",
"binary_name": "linux-tools-5.15.0-1037-bluefield"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "Available for NVIDIA BlueField platforms"
}{
"binaries": [
{
"binary_version": "5.15.0-1051.56+fips1",
"binary_name": "linux-aws-fips-cloud-tools-5.15.0-1051"
},
{
"binary_version": "5.15.0-1051.56+fips1",
"binary_name": "linux-aws-fips-headers-5.15.0-1051"
},
{
"binary_version": "5.15.0-1051.56+fips1",
"binary_name": "linux-aws-fips-tools-5.15.0-1051"
},
{
"binary_version": "5.15.0-1051.56+fips1",
"binary_name": "linux-buildinfo-5.15.0-1051-aws-fips"
},
{
"binary_version": "5.15.0-1051.56+fips1",
"binary_name": "linux-cloud-tools-5.15.0-1051-aws-fips"
},
{
"binary_version": "5.15.0-1051.56+fips1",
"binary_name": "linux-headers-5.15.0-1051-aws-fips"
},
{
"binary_version": "5.15.0-1051.56+fips1",
"binary_name": "linux-image-unsigned-5.15.0-1051-aws-fips"
},
{
"binary_version": "5.15.0-1051.56+fips1",
"binary_name": "linux-image-unsigned-hmac-5.15.0-1051-aws-fips"
},
{
"binary_version": "5.15.0-1051.56+fips1",
"binary_name": "linux-modules-5.15.0-1051-aws-fips"
},
{
"binary_version": "5.15.0-1051.56+fips1",
"binary_name": "linux-modules-extra-5.15.0-1051-aws-fips"
},
{
"binary_version": "5.15.0-1051.56+fips1",
"binary_name": "linux-tools-5.15.0-1051-aws-fips"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.15.0-1053.61+fips1",
"binary_name": "linux-azure-fips-cloud-tools-5.15.0-1053"
},
{
"binary_version": "5.15.0-1053.61+fips1",
"binary_name": "linux-azure-fips-headers-5.15.0-1053"
},
{
"binary_version": "5.15.0-1053.61+fips1",
"binary_name": "linux-azure-fips-tools-5.15.0-1053"
},
{
"binary_version": "5.15.0-1053.61+fips1",
"binary_name": "linux-buildinfo-5.15.0-1053-azure-fips"
},
{
"binary_version": "5.15.0-1053.61+fips1",
"binary_name": "linux-cloud-tools-5.15.0-1053-azure-fips"
},
{
"binary_version": "5.15.0-1053.61+fips1",
"binary_name": "linux-headers-5.15.0-1053-azure-fips"
},
{
"binary_version": "5.15.0-1053.61+fips1",
"binary_name": "linux-image-unsigned-5.15.0-1053-azure-fips"
},
{
"binary_version": "5.15.0-1053.61+fips1",
"binary_name": "linux-image-unsigned-hmac-5.15.0-1053-azure-fips"
},
{
"binary_version": "5.15.0-1053.61+fips1",
"binary_name": "linux-modules-5.15.0-1053-azure-fips"
},
{
"binary_version": "5.15.0-1053.61+fips1",
"binary_name": "linux-modules-extra-5.15.0-1053-azure-fips"
},
{
"binary_version": "5.15.0-1053.61+fips1",
"binary_name": "linux-tools-5.15.0-1053-azure-fips"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.15.0-73.80+fips1",
"binary_name": "linux-buildinfo-5.15.0-73-fips"
},
{
"binary_version": "5.15.0-73.80+fips1",
"binary_name": "linux-fips-headers-5.15.0-73"
},
{
"binary_version": "5.15.0-73.80+fips1",
"binary_name": "linux-fips-tools-5.15.0-73"
},
{
"binary_version": "5.15.0-73.80+fips1",
"binary_name": "linux-fips-tools-host"
},
{
"binary_version": "5.15.0-73.80+fips1",
"binary_name": "linux-headers-5.15.0-73-fips"
},
{
"binary_version": "5.15.0-73.80+fips1",
"binary_name": "linux-image-unsigned-5.15.0-73-fips"
},
{
"binary_version": "5.15.0-73.80+fips1",
"binary_name": "linux-image-unsigned-hmac-5.15.0-73-fips"
},
{
"binary_version": "5.15.0-73.80+fips1",
"binary_name": "linux-modules-5.15.0-73-fips"
},
{
"binary_version": "5.15.0-73.80+fips1",
"binary_name": "linux-modules-extra-5.15.0-73-fips"
},
{
"binary_version": "5.15.0-73.80+fips1",
"binary_name": "linux-modules-iwlwifi-5.15.0-73-fips"
},
{
"binary_version": "5.15.0-73.80+fips1",
"binary_name": "linux-tools-5.15.0-73-fips"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.15.0-1048.56+fips1",
"binary_name": "linux-buildinfo-5.15.0-1048-gcp-fips"
},
{
"binary_version": "5.15.0-1048.56+fips1",
"binary_name": "linux-gcp-fips-headers-5.15.0-1048"
},
{
"binary_version": "5.15.0-1048.56+fips1",
"binary_name": "linux-gcp-fips-tools-5.15.0-1048"
},
{
"binary_version": "5.15.0-1048.56+fips1",
"binary_name": "linux-headers-5.15.0-1048-gcp-fips"
},
{
"binary_version": "5.15.0-1048.56+fips1",
"binary_name": "linux-image-unsigned-5.15.0-1048-gcp-fips"
},
{
"binary_version": "5.15.0-1048.56+fips1",
"binary_name": "linux-image-unsigned-hmac-5.15.0-1048-gcp-fips"
},
{
"binary_version": "5.15.0-1048.56+fips1",
"binary_name": "linux-modules-5.15.0-1048-gcp-fips"
},
{
"binary_version": "5.15.0-1048.56+fips1",
"binary_name": "linux-modules-extra-5.15.0-1048-gcp-fips"
},
{
"binary_version": "5.15.0-1048.56+fips1",
"binary_name": "linux-tools-5.15.0-1048-gcp-fips"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable."
}{
"binaries": [
{
"binary_version": "5.15.0-1056.61+fips1",
"binary_name": "linux-aws-fips-cloud-tools-5.15.0-1056"
},
{
"binary_version": "5.15.0-1056.61+fips1",
"binary_name": "linux-aws-fips-headers-5.15.0-1056"
},
{
"binary_version": "5.15.0-1056.61+fips1",
"binary_name": "linux-aws-fips-tools-5.15.0-1056"
},
{
"binary_version": "5.15.0-1056.61+fips1",
"binary_name": "linux-buildinfo-5.15.0-1056-aws-fips"
},
{
"binary_version": "5.15.0-1056.61+fips1",
"binary_name": "linux-cloud-tools-5.15.0-1056-aws-fips"
},
{
"binary_version": "5.15.0-1056.61+fips1",
"binary_name": "linux-headers-5.15.0-1056-aws-fips"
},
{
"binary_version": "5.15.0-1056.61+fips1",
"binary_name": "linux-image-unsigned-5.15.0-1056-aws-fips"
},
{
"binary_version": "5.15.0-1056.61+fips1",
"binary_name": "linux-image-unsigned-hmac-5.15.0-1056-aws-fips"
},
{
"binary_version": "5.15.0-1056.61+fips1",
"binary_name": "linux-modules-5.15.0-1056-aws-fips"
},
{
"binary_version": "5.15.0-1056.61+fips1",
"binary_name": "linux-modules-extra-5.15.0-1056-aws-fips"
},
{
"binary_version": "5.15.0-1056.61+fips1",
"binary_name": "linux-tools-5.15.0-1056-aws-fips"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}{
"binaries": [
{
"binary_version": "5.15.0-100.110+fips1",
"binary_name": "linux-buildinfo-5.15.0-100-fips"
},
{
"binary_version": "5.15.0-100.110+fips1",
"binary_name": "linux-fips-headers-5.15.0-100"
},
{
"binary_version": "5.15.0-100.110+fips1",
"binary_name": "linux-fips-tools-5.15.0-100"
},
{
"binary_version": "5.15.0-100.110+fips1",
"binary_name": "linux-fips-tools-host"
},
{
"binary_version": "5.15.0-100.110+fips1",
"binary_name": "linux-headers-5.15.0-100-fips"
},
{
"binary_version": "5.15.0-100.110+fips1",
"binary_name": "linux-image-unsigned-5.15.0-100-fips"
},
{
"binary_version": "5.15.0-100.110+fips1",
"binary_name": "linux-image-unsigned-hmac-5.15.0-100-fips"
},
{
"binary_version": "5.15.0-100.110+fips1",
"binary_name": "linux-modules-5.15.0-100-fips"
},
{
"binary_version": "5.15.0-100.110+fips1",
"binary_name": "linux-modules-extra-5.15.0-100-fips"
},
{
"binary_version": "5.15.0-100.110+fips1",
"binary_name": "linux-modules-iwlwifi-5.15.0-100-fips"
},
{
"binary_version": "5.15.0-100.110+fips1",
"binary_name": "linux-tools-5.15.0-100-fips"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"binaries": [
{
"binary_version": "5.15.0-1055.63+fips2",
"binary_name": "linux-buildinfo-5.15.0-1055-gcp-fips"
},
{
"binary_version": "5.15.0-1055.63+fips2",
"binary_name": "linux-gcp-fips-headers-5.15.0-1055"
},
{
"binary_version": "5.15.0-1055.63+fips2",
"binary_name": "linux-gcp-fips-tools-5.15.0-1055"
},
{
"binary_version": "5.15.0-1055.63+fips2",
"binary_name": "linux-headers-5.15.0-1055-gcp-fips"
},
{
"binary_version": "5.15.0-1055.63+fips2",
"binary_name": "linux-image-unsigned-5.15.0-1055-gcp-fips"
},
{
"binary_version": "5.15.0-1055.63+fips2",
"binary_name": "linux-image-unsigned-hmac-5.15.0-1055-gcp-fips"
},
{
"binary_version": "5.15.0-1055.63+fips2",
"binary_name": "linux-modules-5.15.0-1055-gcp-fips"
},
{
"binary_version": "5.15.0-1055.63+fips2",
"binary_name": "linux-modules-extra-5.15.0-1055-gcp-fips"
},
{
"binary_version": "5.15.0-1055.63+fips2",
"binary_name": "linux-tools-5.15.0-1055-gcp-fips"
}
]
}{
"binaries": [
{
"binary_version": "5.15.0-1048.50",
"binary_name": "linux-buildinfo-5.15.0-1048-intel-iot-realtime"
},
{
"binary_version": "5.15.0-1048.50",
"binary_name": "linux-cloud-tools-5.15.0-1048-intel-iot-realtime"
},
{
"binary_version": "5.15.0-1048.50",
"binary_name": "linux-headers-5.15.0-1048-intel-iot-realtime"
},
{
"binary_version": "5.15.0-1048.50",
"binary_name": "linux-image-unsigned-5.15.0-1048-intel-iot-realtime"
},
{
"binary_version": "5.15.0-1048.50",
"binary_name": "linux-intel-iot-realtime-cloud-tools-5.15.0-1048"
},
{
"binary_version": "5.15.0-1048.50",
"binary_name": "linux-intel-iot-realtime-cloud-tools-common"
},
{
"binary_version": "5.15.0-1048.50",
"binary_name": "linux-intel-iot-realtime-headers-5.15.0-1048"
},
{
"binary_version": "5.15.0-1048.50",
"binary_name": "linux-intel-iot-realtime-tools-5.15.0-1048"
},
{
"binary_version": "5.15.0-1048.50",
"binary_name": "linux-intel-iot-realtime-tools-common"
},
{
"binary_version": "5.15.0-1048.50",
"binary_name": "linux-intel-iot-realtime-tools-host"
},
{
"binary_version": "5.15.0-1048.50",
"binary_name": "linux-modules-5.15.0-1048-intel-iot-realtime"
},
{
"binary_version": "5.15.0-1048.50",
"binary_name": "linux-modules-extra-5.15.0-1048-intel-iot-realtime"
},
{
"binary_version": "5.15.0-1048.50",
"binary_name": "linux-tools-5.15.0-1048-intel-iot-realtime"
}
],
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"priority_reason": "The vulnerability depends entirely on the I3C HCI controller hardware generating spurious ring interrupt bits. No software path exists from userspace to trigger or influence the hardware interrupt status register, making the bug not reliably triggerable.",
"binaries": [
{
"binary_version": "5.15.0-1056.63",
"binary_name": "linux-buildinfo-5.15.0-1056-realtime"
},
{
"binary_version": "5.15.0-1056.63",
"binary_name": "linux-cloud-tools-5.15.0-1056-realtime"
},
{
"binary_version": "5.15.0-1056.63",
"binary_name": "linux-headers-5.15.0-1056-realtime"
},
{
"binary_version": "5.15.0-1056.63",
"binary_name": "linux-image-unsigned-5.15.0-1056-realtime"
},
{
"binary_version": "5.15.0-1056.63",
"binary_name": "linux-modules-5.15.0-1056-realtime"
},
{
"binary_version": "5.15.0-1056.63",
"binary_name": "linux-modules-extra-5.15.0-1056-realtime"
},
{
"binary_version": "5.15.0-1056.63",
"binary_name": "linux-realtime-cloud-tools-5.15.0-1056"
},
{
"binary_version": "5.15.0-1056.63",
"binary_name": "linux-realtime-cloud-tools-common"
},
{
"binary_version": "5.15.0-1056.63",
"binary_name": "linux-realtime-headers-5.15.0-1056"
},
{
"binary_version": "5.15.0-1056.63",
"binary_name": "linux-realtime-tools-5.15.0-1056"
},
{
"binary_version": "5.15.0-1056.63",
"binary_name": "linux-realtime-tools-common"
},
{
"binary_version": "5.15.0-1056.63",
"binary_name": "linux-realtime-tools-host"
},
{
"binary_version": "5.15.0-1056.63",
"binary_name": "linux-tools-5.15.0-1056-realtime"
}
]
}