In the Linux kernel, the following vulnerability has been resolved: SUNRPC: Fix UAF in svctcplistendataready() After the listener svcsock is freed, and before invoking svctcpaccept() for the established child sock, there is a window that the newsock retaining a freed listener svcsock in skuserdata which cloning from parent. In the race window, if data is received on the newsock, we will observe use-after-free report in svctcplistendataready(). Reproduce by two tasks: 1. while :; do rpc.nfsd 0 ; rpc.nfsd; done 2. while :; do echo "" | ncat -4 127.0.0.1 2049 ; done KASAN report: ================================================================== BUG: KASAN: slab-use-after-free in svctcplistendataready+0x1cf/0x1f0 [sunrpc] Read of size 8 at addr ffff888139d96228 by task nc/102553 CPU: 7 PID: 102553 Comm: nc Not tainted 6.3.0+ #18 Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 Call Trace: <IRQ> dumpstacklvl+0x33/0x50 printaddressdescription.constprop.0+0x27/0x310 printreport+0x3e/0x70 kasanreport+0xae/0xe0 svctcplistendataready+0x1cf/0x1f0 [sunrpc] tcpdataqueue+0x9f4/0x20e0 tcprcvestablished+0x666/0x1f60 tcpv4dorcv+0x51c/0x850 tcpv4rcv+0x23fc/0x2e80 ipprotocoldeliverrcu+0x62/0x300 iplocaldeliverfinish+0x267/0x350 iplocaldeliver+0x18b/0x2d0 iprcv+0x2fb/0x370 _netifreceiveskbonecore+0x166/0x1b0 processbacklog+0x24c/0x5e0 _napipoll+0xa2/0x500 netrxaction+0x854/0xc90 _dosoftirq+0x1bb/0x5de dosoftirq+0xcb/0x100 </IRQ> <TASK> ... </TASK> Allocated by task 102371: kasansavestack+0x1e/0x40 kasansettrack+0x21/0x30 _kasankmalloc+0x7b/0x90 svcsetupsocket+0x52/0x4f0 [sunrpc] svcaddsock+0x20d/0x400 [sunrpc] _writeportsaddfd+0x209/0x390 [nfsd] writeports+0x239/0x2c0 [nfsd] nfsctltransactionwrite+0xac/0x110 [nfsd] vfswrite+0x1c3/0xae0 ksyswrite+0xed/0x1c0 dosyscall64+0x38/0x90 entrySYSCALL64afterhwframe+0x72/0xdc Freed by task 102551: kasansavestack+0x1e/0x40 kasansettrack+0x21/0x30 kasansavefreeinfo+0x2a/0x50 _kasanslabfree+0x106/0x190 _kmemcachefree+0x133/0x270 svcxprtfree+0x1e2/0x350 [sunrpc] svcxprtdestroyall+0x25a/0x440 [sunrpc] nfsdput+0x125/0x240 [nfsd] nfsdsvc+0x2cb/0x3c0 [nfsd] writethreads+0x1ac/0x2a0 [nfsd] nfsctltransactionwrite+0xac/0x110 [nfsd] vfswrite+0x1c3/0xae0 ksyswrite+0xed/0x1c0 dosyscall64+0x38/0x90 entrySYSCALL64afterhwframe+0x72/0xdc Fix the UAF by simply doing nothing in svctcplistendataready() if state != TCPLISTEN, that will avoid dereferencing svsk for all child socket.
{ "availability": "Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "4.15.0-1191.206~14.04.1", "binary_name": "linux-azure-cloud-tools-4.15.0-1191" }, { "binary_version": "4.15.0-1191.206~14.04.1", "binary_name": "linux-azure-headers-4.15.0-1191" }, { "binary_version": "4.15.0-1191.206~14.04.1", "binary_name": "linux-azure-tools-4.15.0-1191" }, { "binary_version": "4.15.0-1191.206~14.04.1", "binary_name": "linux-buildinfo-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206~14.04.1", "binary_name": "linux-cloud-tools-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206~14.04.1", "binary_name": "linux-headers-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206~14.04.1", "binary_name": "linux-image-unsigned-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206~14.04.1", "binary_name": "linux-image-unsigned-4.15.0-1191-azure-dbgsym" }, { "binary_version": "4.15.0-1191.206~14.04.1", "binary_name": "linux-modules-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206~14.04.1", "binary_name": "linux-modules-extra-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206~14.04.1", "binary_name": "linux-tools-4.15.0-1191-azure" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "4.15.0-1183.196~16.04.1", "binary_name": "linux-aws-headers-4.15.0-1183" }, { "binary_version": "4.15.0-1183.196~16.04.1", "binary_name": "linux-aws-hwe-cloud-tools-4.15.0-1183" }, { "binary_version": "4.15.0-1183.196~16.04.1", "binary_name": "linux-aws-hwe-tools-4.15.0-1183" }, { "binary_version": "4.15.0-1183.196~16.04.1", "binary_name": "linux-buildinfo-4.15.0-1183-aws" }, { "binary_version": "4.15.0-1183.196~16.04.1", "binary_name": "linux-cloud-tools-4.15.0-1183-aws" }, { "binary_version": "4.15.0-1183.196~16.04.1", "binary_name": "linux-headers-4.15.0-1183-aws" }, { "binary_version": "4.15.0-1183.196~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-1183-aws" }, { "binary_version": "4.15.0-1183.196~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-1183-aws-dbgsym" }, { "binary_version": "4.15.0-1183.196~16.04.1", "binary_name": "linux-modules-4.15.0-1183-aws" }, { "binary_version": "4.15.0-1183.196~16.04.1", "binary_name": "linux-modules-extra-4.15.0-1183-aws" }, { "binary_version": "4.15.0-1183.196~16.04.1", "binary_name": "linux-tools-4.15.0-1183-aws" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "4.15.0-1191.206~16.04.1", "binary_name": "linux-azure-cloud-tools-4.15.0-1191" }, { "binary_version": "4.15.0-1191.206~16.04.1", "binary_name": "linux-azure-headers-4.15.0-1191" }, { "binary_version": "4.15.0-1191.206~16.04.1", "binary_name": "linux-azure-tools-4.15.0-1191" }, { "binary_version": "4.15.0-1191.206~16.04.1", "binary_name": "linux-buildinfo-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206~16.04.1", "binary_name": "linux-cloud-tools-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206~16.04.1", "binary_name": "linux-headers-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-1191-azure-dbgsym" }, { "binary_version": "4.15.0-1191.206~16.04.1", "binary_name": "linux-modules-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206~16.04.1", "binary_name": "linux-modules-extra-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206~16.04.1", "binary_name": "linux-tools-4.15.0-1191-azure" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "4.15.0-1176.193~16.04.1", "binary_name": "linux-buildinfo-4.15.0-1176-gcp" }, { "binary_version": "4.15.0-1176.193~16.04.1", "binary_name": "linux-gcp-headers-4.15.0-1176" }, { "binary_version": "4.15.0-1176.193~16.04.1", "binary_name": "linux-gcp-tools-4.15.0-1176" }, { "binary_version": "4.15.0-1176.193~16.04.1", "binary_name": "linux-headers-4.15.0-1176-gcp" }, { "binary_version": "4.15.0-1176.193~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-1176-gcp" }, { "binary_version": "4.15.0-1176.193~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-1176-gcp-dbgsym" }, { "binary_version": "4.15.0-1176.193~16.04.1", "binary_name": "linux-modules-4.15.0-1176-gcp" }, { "binary_version": "4.15.0-1176.193~16.04.1", "binary_name": "linux-modules-extra-4.15.0-1176-gcp" }, { "binary_version": "4.15.0-1176.193~16.04.1", "binary_name": "linux-tools-4.15.0-1176-gcp" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "block-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "crypto-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "dasd-extra-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "dasd-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "fat-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "fb-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "firewire-core-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "floppy-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "fs-core-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "fs-secondary-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "input-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "ipmi-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "irda-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "kernel-image-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-buildinfo-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-buildinfo-4.15.0-240-lowlatency" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-cloud-tools-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-cloud-tools-4.15.0-240-lowlatency" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-headers-4.15.0-240" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-headers-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-headers-4.15.0-240-lowlatency" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-hwe-cloud-tools-4.15.0-240" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-hwe-tools-4.15.0-240" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-hwe-udebs-generic" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-image-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-image-4.15.0-240-generic-dbgsym" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-240-generic-dbgsym" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-240-lowlatency" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-image-unsigned-4.15.0-240-lowlatency-dbgsym" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-modules-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-modules-4.15.0-240-lowlatency" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-modules-extra-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-tools-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "linux-tools-4.15.0-240-lowlatency" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "md-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "message-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "mouse-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "multipath-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "nfs-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "nic-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "nic-pcmcia-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "nic-shared-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "nic-usb-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "parport-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "pata-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "pcmcia-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "pcmcia-storage-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "plip-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "ppp-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "sata-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "scsi-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "serial-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "storage-core-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "usb-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "virtio-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252~16.04.1", "binary_name": "vlan-modules-4.15.0-240-generic-di" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "4.15.0-240.252", "binary_name": "block-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "crypto-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "dasd-extra-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "dasd-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "fat-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "fb-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "firewire-core-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "floppy-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "fs-core-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "fs-secondary-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "input-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "ipmi-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "irda-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "kernel-image-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-buildinfo-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-buildinfo-4.15.0-240-lowlatency" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-cloud-tools-4.15.0-240" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-cloud-tools-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-cloud-tools-4.15.0-240-lowlatency" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-cloud-tools-common" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-doc" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-headers-4.15.0-240" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-headers-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-headers-4.15.0-240-lowlatency" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-image-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-image-4.15.0-240-generic-dbgsym" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-image-unsigned-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-image-unsigned-4.15.0-240-generic-dbgsym" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-image-unsigned-4.15.0-240-lowlatency" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-image-unsigned-4.15.0-240-lowlatency-dbgsym" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-libc-dev" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-modules-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-modules-4.15.0-240-lowlatency" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-modules-extra-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-source-4.15.0" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-tools-4.15.0-240" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-tools-4.15.0-240-generic" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-tools-4.15.0-240-lowlatency" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-tools-common" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-tools-host" }, { "binary_version": "4.15.0-240.252", "binary_name": "linux-udebs-generic" }, { "binary_version": "4.15.0-240.252", "binary_name": "md-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "message-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "mouse-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "multipath-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "nfs-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "nic-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "nic-pcmcia-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "nic-shared-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "nic-usb-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "parport-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "pata-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "pcmcia-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "pcmcia-storage-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "plip-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "ppp-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "sata-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "scsi-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "serial-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "storage-core-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "usb-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "virtio-modules-4.15.0-240-generic-di" }, { "binary_version": "4.15.0-240.252", "binary_name": "vlan-modules-4.15.0-240-generic-di" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "4.15.0-1183.196", "binary_name": "linux-aws-cloud-tools-4.15.0-1183" }, { "binary_version": "4.15.0-1183.196", "binary_name": "linux-aws-headers-4.15.0-1183" }, { "binary_version": "4.15.0-1183.196", "binary_name": "linux-aws-tools-4.15.0-1183" }, { "binary_version": "4.15.0-1183.196", "binary_name": "linux-buildinfo-4.15.0-1183-aws" }, { "binary_version": "4.15.0-1183.196", "binary_name": "linux-cloud-tools-4.15.0-1183-aws" }, { "binary_version": "4.15.0-1183.196", "binary_name": "linux-headers-4.15.0-1183-aws" }, { "binary_version": "4.15.0-1183.196", "binary_name": "linux-image-unsigned-4.15.0-1183-aws" }, { "binary_version": "4.15.0-1183.196", "binary_name": "linux-image-unsigned-4.15.0-1183-aws-dbgsym" }, { "binary_version": "4.15.0-1183.196", "binary_name": "linux-modules-4.15.0-1183-aws" }, { "binary_version": "4.15.0-1183.196", "binary_name": "linux-modules-extra-4.15.0-1183-aws" }, { "binary_version": "4.15.0-1183.196", "binary_name": "linux-tools-4.15.0-1183-aws" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.4.0-1113.123~18.04.1", "binary_name": "linux-aws-5.4-cloud-tools-5.4.0-1113" }, { "binary_version": "5.4.0-1113.123~18.04.1", "binary_name": "linux-aws-5.4-headers-5.4.0-1113" }, { "binary_version": "5.4.0-1113.123~18.04.1", "binary_name": "linux-aws-5.4-tools-5.4.0-1113" }, { "binary_version": "5.4.0-1113.123~18.04.1", "binary_name": "linux-buildinfo-5.4.0-1113-aws" }, { "binary_version": "5.4.0-1113.123~18.04.1", "binary_name": "linux-cloud-tools-5.4.0-1113-aws" }, { "binary_version": "5.4.0-1113.123~18.04.1", "binary_name": "linux-headers-5.4.0-1113-aws" }, { "binary_version": "5.4.0-1113.123~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-1113-aws" }, { "binary_version": "5.4.0-1113.123~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-1113-aws-dbgsym" }, { "binary_version": "5.4.0-1113.123~18.04.1", "binary_name": "linux-modules-5.4.0-1113-aws" }, { "binary_version": "5.4.0-1113.123~18.04.1", "binary_name": "linux-modules-extra-5.4.0-1113-aws" }, { "binary_version": "5.4.0-1113.123~18.04.1", "binary_name": "linux-tools-5.4.0-1113-aws" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "4.15.0-1191.206", "binary_name": "linux-azure-4.15-cloud-tools-4.15.0-1191" }, { "binary_version": "4.15.0-1191.206", "binary_name": "linux-azure-4.15-headers-4.15.0-1191" }, { "binary_version": "4.15.0-1191.206", "binary_name": "linux-azure-4.15-tools-4.15.0-1191" }, { "binary_version": "4.15.0-1191.206", "binary_name": "linux-buildinfo-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206", "binary_name": "linux-cloud-tools-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206", "binary_name": "linux-headers-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206", "binary_name": "linux-image-unsigned-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206", "binary_name": "linux-image-unsigned-4.15.0-1191-azure-dbgsym" }, { "binary_version": "4.15.0-1191.206", "binary_name": "linux-modules-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206", "binary_name": "linux-modules-extra-4.15.0-1191-azure" }, { "binary_version": "4.15.0-1191.206", "binary_name": "linux-tools-4.15.0-1191-azure" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.4.0-1119.126~18.04.2", "binary_name": "linux-azure-5.4-cloud-tools-5.4.0-1119" }, { "binary_version": "5.4.0-1119.126~18.04.2", "binary_name": "linux-azure-5.4-headers-5.4.0-1119" }, { "binary_version": "5.4.0-1119.126~18.04.2", "binary_name": "linux-azure-5.4-tools-5.4.0-1119" }, { "binary_version": "5.4.0-1119.126~18.04.2", "binary_name": "linux-buildinfo-5.4.0-1119-azure" }, { "binary_version": "5.4.0-1119.126~18.04.2", "binary_name": "linux-cloud-tools-5.4.0-1119-azure" }, { "binary_version": "5.4.0-1119.126~18.04.2", "binary_name": "linux-headers-5.4.0-1119-azure" }, { "binary_version": "5.4.0-1119.126~18.04.2", "binary_name": "linux-image-unsigned-5.4.0-1119-azure" }, { "binary_version": "5.4.0-1119.126~18.04.2", "binary_name": "linux-image-unsigned-5.4.0-1119-azure-dbgsym" }, { "binary_version": "5.4.0-1119.126~18.04.2", "binary_name": "linux-modules-5.4.0-1119-azure" }, { "binary_version": "5.4.0-1119.126~18.04.2", "binary_name": "linux-modules-extra-5.4.0-1119-azure" }, { "binary_version": "5.4.0-1119.126~18.04.2", "binary_name": "linux-tools-5.4.0-1119-azure" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "4.15.0-1176.193", "binary_name": "linux-buildinfo-4.15.0-1176-gcp" }, { "binary_version": "4.15.0-1176.193", "binary_name": "linux-gcp-4.15-headers-4.15.0-1176" }, { "binary_version": "4.15.0-1176.193", "binary_name": "linux-gcp-4.15-tools-4.15.0-1176" }, { "binary_version": "4.15.0-1176.193", "binary_name": "linux-headers-4.15.0-1176-gcp" }, { "binary_version": "4.15.0-1176.193", "binary_name": "linux-image-unsigned-4.15.0-1176-gcp" }, { "binary_version": "4.15.0-1176.193", "binary_name": "linux-image-unsigned-4.15.0-1176-gcp-dbgsym" }, { "binary_version": "4.15.0-1176.193", "binary_name": "linux-modules-4.15.0-1176-gcp" }, { "binary_version": "4.15.0-1176.193", "binary_name": "linux-modules-extra-4.15.0-1176-gcp" }, { "binary_version": "4.15.0-1176.193", "binary_name": "linux-tools-4.15.0-1176-gcp" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.4.0-1117.126~18.04.1", "binary_name": "linux-buildinfo-5.4.0-1117-gcp" }, { "binary_version": "5.4.0-1117.126~18.04.1", "binary_name": "linux-gcp-5.4-headers-5.4.0-1117" }, { "binary_version": "5.4.0-1117.126~18.04.1", "binary_name": "linux-gcp-5.4-tools-5.4.0-1117" }, { "binary_version": "5.4.0-1117.126~18.04.1", "binary_name": "linux-headers-5.4.0-1117-gcp" }, { "binary_version": "5.4.0-1117.126~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-1117-gcp" }, { "binary_version": "5.4.0-1117.126~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-1117-gcp-dbgsym" }, { "binary_version": "5.4.0-1117.126~18.04.1", "binary_name": "linux-modules-5.4.0-1117-gcp" }, { "binary_version": "5.4.0-1117.126~18.04.1", "binary_name": "linux-modules-extra-5.4.0-1117-gcp" }, { "binary_version": "5.4.0-1117.126~18.04.1", "binary_name": "linux-tools-5.4.0-1117-gcp" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "block-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "crypto-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "dasd-extra-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "dasd-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "fat-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "fb-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "firewire-core-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "floppy-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "fs-core-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "fs-secondary-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "input-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "ipmi-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "kernel-image-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "linux-buildinfo-5.4.0-166-generic" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "linux-buildinfo-5.4.0-166-lowlatency" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "linux-cloud-tools-5.4.0-166-generic" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "linux-cloud-tools-5.4.0-166-lowlatency" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "linux-headers-5.4.0-166-generic" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "linux-headers-5.4.0-166-lowlatency" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "linux-hwe-5.4-cloud-tools-5.4.0-166" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "linux-hwe-5.4-cloud-tools-common" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "linux-hwe-5.4-headers-5.4.0-166" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "linux-hwe-5.4-source-5.4.0" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "linux-hwe-5.4-tools-5.4.0-166" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "linux-hwe-5.4-tools-common" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "linux-hwe-5.4-udebs-generic" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "linux-image-unsigned-5.4.0-166-generic" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "linux-image-unsigned-5.4.0-166-generic-dbgsym" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "linux-image-unsigned-5.4.0-166-lowlatency" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "linux-image-unsigned-5.4.0-166-lowlatency-dbgsym" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "linux-modules-5.4.0-166-generic" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "linux-modules-5.4.0-166-lowlatency" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "linux-modules-extra-5.4.0-166-generic" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "linux-tools-5.4.0-166-generic" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "linux-tools-5.4.0-166-lowlatency" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "md-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "message-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "mouse-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "multipath-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "nfs-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "nic-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "nic-pcmcia-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "nic-shared-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "nic-usb-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "parport-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "pata-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "pcmcia-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "pcmcia-storage-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "plip-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "ppp-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "sata-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "scsi-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "serial-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "storage-core-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "usb-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "virtio-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183~18.04.2", "binary_name": "vlan-modules-5.4.0-166-generic-di" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.4.0-1060.65~18.04.1", "binary_name": "linux-buildinfo-5.4.0-1060-ibm" }, { "binary_version": "5.4.0-1060.65~18.04.1", "binary_name": "linux-headers-5.4.0-1060-ibm" }, { "binary_version": "5.4.0-1060.65~18.04.1", "binary_name": "linux-ibm-5.4-cloud-tools-common" }, { "binary_version": "5.4.0-1060.65~18.04.1", "binary_name": "linux-ibm-5.4-headers-5.4.0-1060" }, { "binary_version": "5.4.0-1060.65~18.04.1", "binary_name": "linux-ibm-5.4-source-5.4.0" }, { "binary_version": "5.4.0-1060.65~18.04.1", "binary_name": "linux-ibm-5.4-tools-5.4.0-1060" }, { "binary_version": "5.4.0-1060.65~18.04.1", "binary_name": "linux-ibm-5.4-tools-common" }, { "binary_version": "5.4.0-1060.65~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-1060-ibm" }, { "binary_version": "5.4.0-1060.65~18.04.1", "binary_name": "linux-image-unsigned-5.4.0-1060-ibm-dbgsym" }, { "binary_version": "5.4.0-1060.65~18.04.1", "binary_name": "linux-modules-5.4.0-1060-ibm" }, { "binary_version": "5.4.0-1060.65~18.04.1", "binary_name": "linux-modules-extra-5.4.0-1060-ibm" }, { "binary_version": "5.4.0-1060.65~18.04.1", "binary_name": "linux-tools-5.4.0-1060-ibm" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "4.15.0-1166.171", "binary_name": "linux-buildinfo-4.15.0-1166-kvm" }, { "binary_version": "4.15.0-1166.171", "binary_name": "linux-headers-4.15.0-1166-kvm" }, { "binary_version": "4.15.0-1166.171", "binary_name": "linux-image-4.15.0-1166-kvm" }, { "binary_version": "4.15.0-1166.171", "binary_name": "linux-image-4.15.0-1166-kvm-dbgsym" }, { "binary_version": "4.15.0-1166.171", "binary_name": "linux-kvm-headers-4.15.0-1166" }, { "binary_version": "4.15.0-1166.171", "binary_name": "linux-kvm-tools-4.15.0-1166" }, { "binary_version": "4.15.0-1166.171", "binary_name": "linux-modules-4.15.0-1166-kvm" }, { "binary_version": "4.15.0-1166.171", "binary_name": "linux-tools-4.15.0-1166-kvm" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "4.15.0-1145.156", "binary_name": "linux-buildinfo-4.15.0-1145-oracle" }, { "binary_version": "4.15.0-1145.156", "binary_name": "linux-headers-4.15.0-1145-oracle" }, { "binary_version": "4.15.0-1145.156", "binary_name": "linux-image-unsigned-4.15.0-1145-oracle" }, { "binary_version": "4.15.0-1145.156", "binary_name": "linux-image-unsigned-4.15.0-1145-oracle-dbgsym" }, { "binary_version": "4.15.0-1145.156", "binary_name": "linux-modules-4.15.0-1145-oracle" }, { "binary_version": "4.15.0-1145.156", "binary_name": "linux-modules-extra-4.15.0-1145-oracle" }, { "binary_version": "4.15.0-1145.156", "binary_name": "linux-oracle-headers-4.15.0-1145" }, { "binary_version": "4.15.0-1145.156", "binary_name": "linux-oracle-tools-4.15.0-1145" }, { "binary_version": "4.15.0-1145.156", "binary_name": "linux-tools-4.15.0-1145-oracle" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.4.0-1112.121~18.04.4", "binary_name": "linux-buildinfo-5.4.0-1112-oracle" }, { "binary_version": "5.4.0-1112.121~18.04.4", "binary_name": "linux-headers-5.4.0-1112-oracle" }, { "binary_version": "5.4.0-1112.121~18.04.4", "binary_name": "linux-image-unsigned-5.4.0-1112-oracle" }, { "binary_version": "5.4.0-1112.121~18.04.4", "binary_name": "linux-image-unsigned-5.4.0-1112-oracle-dbgsym" }, { "binary_version": "5.4.0-1112.121~18.04.4", "binary_name": "linux-modules-5.4.0-1112-oracle" }, { "binary_version": "5.4.0-1112.121~18.04.4", "binary_name": "linux-modules-extra-5.4.0-1112-oracle" }, { "binary_version": "5.4.0-1112.121~18.04.4", "binary_name": "linux-oracle-5.4-headers-5.4.0-1112" }, { "binary_version": "5.4.0-1112.121~18.04.4", "binary_name": "linux-oracle-5.4-tools-5.4.0-1112" }, { "binary_version": "5.4.0-1112.121~18.04.4", "binary_name": "linux-tools-5.4.0-1112-oracle" } ] }
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.4.0-1097.109~18.04.2", "binary_name": "linux-buildinfo-5.4.0-1097-raspi" }, { "binary_version": "5.4.0-1097.109~18.04.2", "binary_name": "linux-headers-5.4.0-1097-raspi" }, { "binary_version": "5.4.0-1097.109~18.04.2", "binary_name": "linux-image-5.4.0-1097-raspi" }, { "binary_version": "5.4.0-1097.109~18.04.2", "binary_name": "linux-image-5.4.0-1097-raspi-dbgsym" }, { "binary_version": "5.4.0-1097.109~18.04.2", "binary_name": "linux-modules-5.4.0-1097-raspi" }, { "binary_version": "5.4.0-1097.109~18.04.2", "binary_name": "linux-raspi-5.4-headers-5.4.0-1097" }, { "binary_version": "5.4.0-1097.109~18.04.2", "binary_name": "linux-raspi-5.4-tools-5.4.0-1097" }, { "binary_version": "5.4.0-1097.109~18.04.2", "binary_name": "linux-tools-5.4.0-1097-raspi" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "4.15.0-2121.127", "binary_name": "linux-aws-fips-headers-4.15.0-2121" }, { "binary_version": "4.15.0-2121.127", "binary_name": "linux-aws-fips-tools-4.15.0-2121" }, { "binary_version": "4.15.0-2121.127", "binary_name": "linux-buildinfo-4.15.0-2121-aws-fips" }, { "binary_version": "4.15.0-2121.127", "binary_name": "linux-headers-4.15.0-2121-aws-fips" }, { "binary_version": "4.15.0-2121.127", "binary_name": "linux-image-unsigned-4.15.0-2121-aws-fips" }, { "binary_version": "4.15.0-2121.127", "binary_name": "linux-image-unsigned-4.15.0-2121-aws-fips-dbgsym" }, { "binary_version": "4.15.0-2121.127", "binary_name": "linux-image-unsigned-hmac-4.15.0-2121-aws-fips" }, { "binary_version": "4.15.0-2121.127", "binary_name": "linux-modules-4.15.0-2121-aws-fips" }, { "binary_version": "4.15.0-2121.127", "binary_name": "linux-modules-extra-4.15.0-2121-aws-fips" }, { "binary_version": "4.15.0-2121.127", "binary_name": "linux-tools-4.15.0-2121-aws-fips" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "4.15.0-2100.106", "binary_name": "linux-azure-fips-cloud-tools-4.15.0-2100" }, { "binary_version": "4.15.0-2100.106", "binary_name": "linux-azure-fips-headers-4.15.0-2100" }, { "binary_version": "4.15.0-2100.106", "binary_name": "linux-azure-fips-tools-4.15.0-2100" }, { "binary_version": "4.15.0-2100.106", "binary_name": "linux-buildinfo-4.15.0-2100-azure-fips" }, { "binary_version": "4.15.0-2100.106", "binary_name": "linux-cloud-tools-4.15.0-2100-azure-fips" }, { "binary_version": "4.15.0-2100.106", "binary_name": "linux-headers-4.15.0-2100-azure-fips" }, { "binary_version": "4.15.0-2100.106", "binary_name": "linux-image-unsigned-4.15.0-2100-azure-fips" }, { "binary_version": "4.15.0-2100.106", "binary_name": "linux-image-unsigned-4.15.0-2100-azure-fips-dbgsym" }, { "binary_version": "4.15.0-2100.106", "binary_name": "linux-image-unsigned-hmac-4.15.0-2100-azure-fips" }, { "binary_version": "4.15.0-2100.106", "binary_name": "linux-modules-4.15.0-2100-azure-fips" }, { "binary_version": "4.15.0-2100.106", "binary_name": "linux-modules-extra-4.15.0-2100-azure-fips" }, { "binary_version": "4.15.0-2100.106", "binary_name": "linux-tools-4.15.0-2100-azure-fips" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "4.15.0-1138.149", "binary_name": "linux-buildinfo-4.15.0-1138-fips" }, { "binary_version": "4.15.0-1138.149", "binary_name": "linux-fips-headers-4.15.0-1138" }, { "binary_version": "4.15.0-1138.149", "binary_name": "linux-fips-tools-4.15.0-1138" }, { "binary_version": "4.15.0-1138.149", "binary_name": "linux-fips-tools-host" }, { "binary_version": "4.15.0-1138.149", "binary_name": "linux-headers-4.15.0-1138-fips" }, { "binary_version": "4.15.0-1138.149", "binary_name": "linux-image-4.15.0-1138-fips" }, { "binary_version": "4.15.0-1138.149", "binary_name": "linux-image-4.15.0-1138-fips-dbgsym" }, { "binary_version": "4.15.0-1138.149", "binary_name": "linux-image-hmac-4.15.0-1138-fips" }, { "binary_version": "4.15.0-1138.149", "binary_name": "linux-image-unsigned-4.15.0-1138-fips" }, { "binary_version": "4.15.0-1138.149", "binary_name": "linux-image-unsigned-4.15.0-1138-fips-dbgsym" }, { "binary_version": "4.15.0-1138.149", "binary_name": "linux-image-unsigned-hmac-4.15.0-1138-fips" }, { "binary_version": "4.15.0-1138.149", "binary_name": "linux-modules-4.15.0-1138-fips" }, { "binary_version": "4.15.0-1138.149", "binary_name": "linux-modules-extra-4.15.0-1138-fips" }, { "binary_version": "4.15.0-1138.149", "binary_name": "linux-tools-4.15.0-1138-fips" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "4.15.0-2084.90", "binary_name": "linux-buildinfo-4.15.0-2084-gcp-fips" }, { "binary_version": "4.15.0-2084.90", "binary_name": "linux-gcp-fips-headers-4.15.0-2084" }, { "binary_version": "4.15.0-2084.90", "binary_name": "linux-gcp-fips-tools-4.15.0-2084" }, { "binary_version": "4.15.0-2084.90", "binary_name": "linux-headers-4.15.0-2084-gcp-fips" }, { "binary_version": "4.15.0-2084.90", "binary_name": "linux-image-unsigned-4.15.0-2084-gcp-fips" }, { "binary_version": "4.15.0-2084.90", "binary_name": "linux-image-unsigned-4.15.0-2084-gcp-fips-dbgsym" }, { "binary_version": "4.15.0-2084.90", "binary_name": "linux-image-unsigned-hmac-4.15.0-2084-gcp-fips" }, { "binary_version": "4.15.0-2084.90", "binary_name": "linux-modules-4.15.0-2084-gcp-fips" }, { "binary_version": "4.15.0-2084.90", "binary_name": "linux-modules-extra-4.15.0-2084-gcp-fips" }, { "binary_version": "4.15.0-2084.90", "binary_name": "linux-tools-4.15.0-2084-gcp-fips" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.4.0-166.183", "binary_name": "block-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "block-modules-5.4.0-166-generic-lpae-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "crypto-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "crypto-modules-5.4.0-166-generic-lpae-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "dasd-extra-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "dasd-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "fat-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "fat-modules-5.4.0-166-generic-lpae-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "fb-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "firewire-core-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "floppy-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "fs-core-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "fs-core-modules-5.4.0-166-generic-lpae-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "fs-secondary-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "fs-secondary-modules-5.4.0-166-generic-lpae-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "input-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "input-modules-5.4.0-166-generic-lpae-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "ipmi-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "ipmi-modules-5.4.0-166-generic-lpae-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "kernel-image-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "kernel-image-5.4.0-166-generic-lpae-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-buildinfo-5.4.0-166-generic" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-buildinfo-5.4.0-166-generic-lpae" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-buildinfo-5.4.0-166-lowlatency" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-cloud-tools-5.4.0-166" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-cloud-tools-5.4.0-166-generic" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-cloud-tools-5.4.0-166-lowlatency" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-cloud-tools-common" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-doc" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-headers-5.4.0-166" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-headers-5.4.0-166-generic" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-headers-5.4.0-166-generic-lpae" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-headers-5.4.0-166-lowlatency" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-image-5.4.0-166-generic" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-image-5.4.0-166-generic-dbgsym" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-image-5.4.0-166-generic-lpae" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-image-5.4.0-166-generic-lpae-dbgsym" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-image-unsigned-5.4.0-166-generic" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-image-unsigned-5.4.0-166-generic-dbgsym" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-image-unsigned-5.4.0-166-lowlatency" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-image-unsigned-5.4.0-166-lowlatency-dbgsym" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-libc-dev" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-modules-5.4.0-166-generic" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-modules-5.4.0-166-generic-lpae" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-modules-5.4.0-166-lowlatency" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-modules-extra-5.4.0-166-generic" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-source-5.4.0" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-tools-5.4.0-166" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-tools-5.4.0-166-generic" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-tools-5.4.0-166-generic-lpae" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-tools-5.4.0-166-lowlatency" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-tools-common" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-tools-host" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-udebs-generic" }, { "binary_version": "5.4.0-166.183", "binary_name": "linux-udebs-generic-lpae" }, { "binary_version": "5.4.0-166.183", "binary_name": "md-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "md-modules-5.4.0-166-generic-lpae-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "message-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "mouse-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "mouse-modules-5.4.0-166-generic-lpae-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "multipath-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "multipath-modules-5.4.0-166-generic-lpae-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "nfs-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "nfs-modules-5.4.0-166-generic-lpae-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "nic-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "nic-modules-5.4.0-166-generic-lpae-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "nic-pcmcia-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "nic-shared-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "nic-shared-modules-5.4.0-166-generic-lpae-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "nic-usb-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "nic-usb-modules-5.4.0-166-generic-lpae-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "parport-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "parport-modules-5.4.0-166-generic-lpae-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "pata-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "pcmcia-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "pcmcia-storage-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "plip-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "plip-modules-5.4.0-166-generic-lpae-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "ppp-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "ppp-modules-5.4.0-166-generic-lpae-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "sata-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "sata-modules-5.4.0-166-generic-lpae-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "scsi-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "scsi-modules-5.4.0-166-generic-lpae-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "serial-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "storage-core-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "storage-core-modules-5.4.0-166-generic-lpae-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "usb-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "usb-modules-5.4.0-166-generic-lpae-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "virtio-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "vlan-modules-5.4.0-166-generic-di" }, { "binary_version": "5.4.0-166.183", "binary_name": "vlan-modules-5.4.0-166-generic-lpae-di" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.4.0-1113.123", "binary_name": "linux-aws-cloud-tools-5.4.0-1113" }, { "binary_version": "5.4.0-1113.123", "binary_name": "linux-aws-headers-5.4.0-1113" }, { "binary_version": "5.4.0-1113.123", "binary_name": "linux-aws-tools-5.4.0-1113" }, { "binary_version": "5.4.0-1113.123", "binary_name": "linux-buildinfo-5.4.0-1113-aws" }, { "binary_version": "5.4.0-1113.123", "binary_name": "linux-cloud-tools-5.4.0-1113-aws" }, { "binary_version": "5.4.0-1113.123", "binary_name": "linux-headers-5.4.0-1113-aws" }, { "binary_version": "5.4.0-1113.123", "binary_name": "linux-image-unsigned-5.4.0-1113-aws" }, { "binary_version": "5.4.0-1113.123", "binary_name": "linux-image-unsigned-5.4.0-1113-aws-dbgsym" }, { "binary_version": "5.4.0-1113.123", "binary_name": "linux-modules-5.4.0-1113-aws" }, { "binary_version": "5.4.0-1113.123", "binary_name": "linux-modules-extra-5.4.0-1113-aws" }, { "binary_version": "5.4.0-1113.123", "binary_name": "linux-tools-5.4.0-1113-aws" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1047.52~20.04.1", "binary_name": "linux-aws-5.15-cloud-tools-5.15.0-1047" }, { "binary_version": "5.15.0-1047.52~20.04.1", "binary_name": "linux-aws-5.15-headers-5.15.0-1047" }, { "binary_version": "5.15.0-1047.52~20.04.1", "binary_name": "linux-aws-5.15-tools-5.15.0-1047" }, { "binary_version": "5.15.0-1047.52~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1047-aws" }, { "binary_version": "5.15.0-1047.52~20.04.1", "binary_name": "linux-cloud-tools-5.15.0-1047-aws" }, { "binary_version": "5.15.0-1047.52~20.04.1", "binary_name": "linux-headers-5.15.0-1047-aws" }, { "binary_version": "5.15.0-1047.52~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1047-aws" }, { "binary_version": "5.15.0-1047.52~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1047-aws-dbgsym" }, { "binary_version": "5.15.0-1047.52~20.04.1", "binary_name": "linux-modules-5.15.0-1047-aws" }, { "binary_version": "5.15.0-1047.52~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1047-aws" }, { "binary_version": "5.15.0-1047.52~20.04.1", "binary_name": "linux-tools-5.15.0-1047-aws" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.4.0-1119.126", "binary_name": "linux-azure-cloud-tools-5.4.0-1119" }, { "binary_version": "5.4.0-1119.126", "binary_name": "linux-azure-headers-5.4.0-1119" }, { "binary_version": "5.4.0-1119.126", "binary_name": "linux-azure-tools-5.4.0-1119" }, { "binary_version": "5.4.0-1119.126", "binary_name": "linux-buildinfo-5.4.0-1119-azure" }, { "binary_version": "5.4.0-1119.126", "binary_name": "linux-cloud-tools-5.4.0-1119-azure" }, { "binary_version": "5.4.0-1119.126", "binary_name": "linux-headers-5.4.0-1119-azure" }, { "binary_version": "5.4.0-1119.126", "binary_name": "linux-image-unsigned-5.4.0-1119-azure" }, { "binary_version": "5.4.0-1119.126", "binary_name": "linux-image-unsigned-5.4.0-1119-azure-dbgsym" }, { "binary_version": "5.4.0-1119.126", "binary_name": "linux-modules-5.4.0-1119-azure" }, { "binary_version": "5.4.0-1119.126", "binary_name": "linux-modules-extra-5.4.0-1119-azure" }, { "binary_version": "5.4.0-1119.126", "binary_name": "linux-tools-5.4.0-1119-azure" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1049.56~20.04.1", "binary_name": "linux-azure-5.15-cloud-tools-5.15.0-1049" }, { "binary_version": "5.15.0-1049.56~20.04.1", "binary_name": "linux-azure-5.15-headers-5.15.0-1049" }, { "binary_version": "5.15.0-1049.56~20.04.1", "binary_name": "linux-azure-5.15-tools-5.15.0-1049" }, { "binary_version": "5.15.0-1049.56~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1049-azure" }, { "binary_version": "5.15.0-1049.56~20.04.1", "binary_name": "linux-cloud-tools-5.15.0-1049-azure" }, { "binary_version": "5.15.0-1049.56~20.04.1", "binary_name": "linux-headers-5.15.0-1049-azure" }, { "binary_version": "5.15.0-1049.56~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1049-azure" }, { "binary_version": "5.15.0-1049.56~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1049-azure-dbgsym" }, { "binary_version": "5.15.0-1049.56~20.04.1", "binary_name": "linux-modules-5.15.0-1049-azure" }, { "binary_version": "5.15.0-1049.56~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1049-azure" }, { "binary_version": "5.15.0-1049.56~20.04.1", "binary_name": "linux-tools-5.15.0-1049-azure" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.4.0-1074.80", "binary_name": "linux-bluefield-headers-5.4.0-1074" }, { "binary_version": "5.4.0-1074.80", "binary_name": "linux-bluefield-tools-5.4.0-1074" }, { "binary_version": "5.4.0-1074.80", "binary_name": "linux-buildinfo-5.4.0-1074-bluefield" }, { "binary_version": "5.4.0-1074.80", "binary_name": "linux-headers-5.4.0-1074-bluefield" }, { "binary_version": "5.4.0-1074.80", "binary_name": "linux-image-unsigned-5.4.0-1074-bluefield" }, { "binary_version": "5.4.0-1074.80", "binary_name": "linux-image-unsigned-5.4.0-1074-bluefield-dbgsym" }, { "binary_version": "5.4.0-1074.80", "binary_name": "linux-modules-5.4.0-1074-bluefield" }, { "binary_version": "5.4.0-1074.80", "binary_name": "linux-tools-5.4.0-1074-bluefield" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.4.0-1117.126", "binary_name": "linux-buildinfo-5.4.0-1117-gcp" }, { "binary_version": "5.4.0-1117.126", "binary_name": "linux-gcp-headers-5.4.0-1117" }, { "binary_version": "5.4.0-1117.126", "binary_name": "linux-gcp-tools-5.4.0-1117" }, { "binary_version": "5.4.0-1117.126", "binary_name": "linux-headers-5.4.0-1117-gcp" }, { "binary_version": "5.4.0-1117.126", "binary_name": "linux-image-unsigned-5.4.0-1117-gcp" }, { "binary_version": "5.4.0-1117.126", "binary_name": "linux-image-unsigned-5.4.0-1117-gcp-dbgsym" }, { "binary_version": "5.4.0-1117.126", "binary_name": "linux-modules-5.4.0-1117-gcp" }, { "binary_version": "5.4.0-1117.126", "binary_name": "linux-modules-extra-5.4.0-1117-gcp" }, { "binary_version": "5.4.0-1117.126", "binary_name": "linux-tools-5.4.0-1117-gcp" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1044.52~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1044-gcp" }, { "binary_version": "5.15.0-1044.52~20.04.1", "binary_name": "linux-gcp-5.15-headers-5.15.0-1044" }, { "binary_version": "5.15.0-1044.52~20.04.1", "binary_name": "linux-gcp-5.15-tools-5.15.0-1044" }, { "binary_version": "5.15.0-1044.52~20.04.1", "binary_name": "linux-headers-5.15.0-1044-gcp" }, { "binary_version": "5.15.0-1044.52~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1044-gcp" }, { "binary_version": "5.15.0-1044.52~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1044-gcp-dbgsym" }, { "binary_version": "5.15.0-1044.52~20.04.1", "binary_name": "linux-modules-5.15.0-1044-gcp" }, { "binary_version": "5.15.0-1044.52~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1044-gcp" }, { "binary_version": "5.15.0-1044.52~20.04.1", "binary_name": "linux-modules-iwlwifi-5.15.0-1044-gcp" }, { "binary_version": "5.15.0-1044.52~20.04.1", "binary_name": "linux-tools-5.15.0-1044-gcp" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.4.0-1080.84", "binary_name": "linux-buildinfo-5.4.0-1080-gkeop" }, { "binary_version": "5.4.0-1080.84", "binary_name": "linux-cloud-tools-5.4.0-1080-gkeop" }, { "binary_version": "5.4.0-1080.84", "binary_name": "linux-gkeop-cloud-tools-5.4.0-1080" }, { "binary_version": "5.4.0-1080.84", "binary_name": "linux-gkeop-headers-5.4.0-1080" }, { "binary_version": "5.4.0-1080.84", "binary_name": "linux-gkeop-source-5.4.0" }, { "binary_version": "5.4.0-1080.84", "binary_name": "linux-gkeop-tools-5.4.0-1080" }, { "binary_version": "5.4.0-1080.84", "binary_name": "linux-headers-5.4.0-1080-gkeop" }, { "binary_version": "5.4.0-1080.84", "binary_name": "linux-image-unsigned-5.4.0-1080-gkeop" }, { "binary_version": "5.4.0-1080.84", "binary_name": "linux-image-unsigned-5.4.0-1080-gkeop-dbgsym" }, { "binary_version": "5.4.0-1080.84", "binary_name": "linux-modules-5.4.0-1080-gkeop" }, { "binary_version": "5.4.0-1080.84", "binary_name": "linux-modules-extra-5.4.0-1080-gkeop" }, { "binary_version": "5.4.0-1080.84", "binary_name": "linux-tools-5.4.0-1080-gkeop" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1030.35~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1030-gkeop" }, { "binary_version": "5.15.0-1030.35~20.04.1", "binary_name": "linux-cloud-tools-5.15.0-1030-gkeop" }, { "binary_version": "5.15.0-1030.35~20.04.1", "binary_name": "linux-gkeop-5.15-cloud-tools-5.15.0-1030" }, { "binary_version": "5.15.0-1030.35~20.04.1", "binary_name": "linux-gkeop-5.15-headers-5.15.0-1030" }, { "binary_version": "5.15.0-1030.35~20.04.1", "binary_name": "linux-gkeop-5.15-tools-5.15.0-1030" }, { "binary_version": "5.15.0-1030.35~20.04.1", "binary_name": "linux-headers-5.15.0-1030-gkeop" }, { "binary_version": "5.15.0-1030.35~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1030-gkeop" }, { "binary_version": "5.15.0-1030.35~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1030-gkeop-dbgsym" }, { "binary_version": "5.15.0-1030.35~20.04.1", "binary_name": "linux-modules-5.15.0-1030-gkeop" }, { "binary_version": "5.15.0-1030.35~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1030-gkeop" }, { "binary_version": "5.15.0-1030.35~20.04.1", "binary_name": "linux-tools-5.15.0-1030-gkeop" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-buildinfo-5.15.0-86-generic" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-buildinfo-5.15.0-86-generic-64k" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-buildinfo-5.15.0-86-generic-lpae" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-cloud-tools-5.15.0-86-generic" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-headers-5.15.0-86-generic" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-headers-5.15.0-86-generic-64k" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-headers-5.15.0-86-generic-lpae" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-hwe-5.15-cloud-tools-5.15.0-86" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-hwe-5.15-cloud-tools-common" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-hwe-5.15-headers-5.15.0-86" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-hwe-5.15-source-5.15.0" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-hwe-5.15-tools-5.15.0-86" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-hwe-5.15-tools-common" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-hwe-5.15-tools-host" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-image-5.15.0-86-generic" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-image-5.15.0-86-generic-dbgsym" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-image-5.15.0-86-generic-lpae" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-image-5.15.0-86-generic-lpae-dbgsym" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-86-generic" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-86-generic-64k" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-86-generic-64k-dbgsym" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-86-generic-dbgsym" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-modules-5.15.0-86-generic" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-modules-5.15.0-86-generic-64k" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-modules-5.15.0-86-generic-lpae" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-modules-extra-5.15.0-86-generic" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-modules-iwlwifi-5.15.0-86-generic" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-tools-5.15.0-86-generic" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-tools-5.15.0-86-generic-64k" }, { "binary_version": "5.15.0-86.96~20.04.1", "binary_name": "linux-tools-5.15.0-86-generic-lpae" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.4.0-1060.65", "binary_name": "linux-buildinfo-5.4.0-1060-ibm" }, { "binary_version": "5.4.0-1060.65", "binary_name": "linux-headers-5.4.0-1060-ibm" }, { "binary_version": "5.4.0-1060.65", "binary_name": "linux-ibm-cloud-tools-common" }, { "binary_version": "5.4.0-1060.65", "binary_name": "linux-ibm-headers-5.4.0-1060" }, { "binary_version": "5.4.0-1060.65", "binary_name": "linux-ibm-source-5.4.0" }, { "binary_version": "5.4.0-1060.65", "binary_name": "linux-ibm-tools-5.4.0-1060" }, { "binary_version": "5.4.0-1060.65", "binary_name": "linux-ibm-tools-common" }, { "binary_version": "5.4.0-1060.65", "binary_name": "linux-image-unsigned-5.4.0-1060-ibm" }, { "binary_version": "5.4.0-1060.65", "binary_name": "linux-image-unsigned-5.4.0-1060-ibm-dbgsym" }, { "binary_version": "5.4.0-1060.65", "binary_name": "linux-modules-5.4.0-1060-ibm" }, { "binary_version": "5.4.0-1060.65", "binary_name": "linux-modules-extra-5.4.0-1060-ibm" }, { "binary_version": "5.4.0-1060.65", "binary_name": "linux-tools-5.4.0-1060-ibm" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1040.43~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1040-ibm" }, { "binary_version": "5.15.0-1040.43~20.04.1", "binary_name": "linux-headers-5.15.0-1040-ibm" }, { "binary_version": "5.15.0-1040.43~20.04.1", "binary_name": "linux-ibm-5.15-headers-5.15.0-1040" }, { "binary_version": "5.15.0-1040.43~20.04.1", "binary_name": "linux-ibm-5.15-source-5.15.0" }, { "binary_version": "5.15.0-1040.43~20.04.1", "binary_name": "linux-ibm-5.15-tools-5.15.0-1040" }, { "binary_version": "5.15.0-1040.43~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1040-ibm" }, { "binary_version": "5.15.0-1040.43~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1040-ibm-dbgsym" }, { "binary_version": "5.15.0-1040.43~20.04.1", "binary_name": "linux-modules-5.15.0-1040-ibm" }, { "binary_version": "5.15.0-1040.43~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1040-ibm" }, { "binary_version": "5.15.0-1040.43~20.04.1", "binary_name": "linux-tools-5.15.0-1040-ibm" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1043.49~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1043-intel-iotg" }, { "binary_version": "5.15.0-1043.49~20.04.1", "binary_name": "linux-cloud-tools-5.15.0-1043-intel-iotg" }, { "binary_version": "5.15.0-1043.49~20.04.1", "binary_name": "linux-headers-5.15.0-1043-intel-iotg" }, { "binary_version": "5.15.0-1043.49~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1043-intel-iotg" }, { "binary_version": "5.15.0-1043.49~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1043-intel-iotg-dbgsym" }, { "binary_version": "5.15.0-1043.49~20.04.1", "binary_name": "linux-intel-iotg-5.15-cloud-tools-5.15.0-1043" }, { "binary_version": "5.15.0-1043.49~20.04.1", "binary_name": "linux-intel-iotg-5.15-cloud-tools-common" }, { "binary_version": "5.15.0-1043.49~20.04.1", "binary_name": "linux-intel-iotg-5.15-headers-5.15.0-1043" }, { "binary_version": "5.15.0-1043.49~20.04.1", "binary_name": "linux-intel-iotg-5.15-tools-5.15.0-1043" }, { "binary_version": "5.15.0-1043.49~20.04.1", "binary_name": "linux-intel-iotg-5.15-tools-common" }, { "binary_version": "5.15.0-1043.49~20.04.1", "binary_name": "linux-intel-iotg-5.15-tools-host" }, { "binary_version": "5.15.0-1043.49~20.04.1", "binary_name": "linux-modules-5.15.0-1043-intel-iotg" }, { "binary_version": "5.15.0-1043.49~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1043-intel-iotg" }, { "binary_version": "5.15.0-1043.49~20.04.1", "binary_name": "linux-modules-iwlwifi-5.15.0-1043-intel-iotg" }, { "binary_version": "5.15.0-1043.49~20.04.1", "binary_name": "linux-tools-5.15.0-1043-intel-iotg" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.4.0-1025.26", "binary_name": "linux-buildinfo-5.4.0-1025-iot" }, { "binary_version": "5.4.0-1025.26", "binary_name": "linux-headers-5.4.0-1025-iot" }, { "binary_version": "5.4.0-1025.26", "binary_name": "linux-image-5.4.0-1025-iot" }, { "binary_version": "5.4.0-1025.26", "binary_name": "linux-image-5.4.0-1025-iot-dbgsym" }, { "binary_version": "5.4.0-1025.26", "binary_name": "linux-image-unsigned-5.4.0-1025-iot" }, { "binary_version": "5.4.0-1025.26", "binary_name": "linux-image-unsigned-5.4.0-1025-iot-dbgsym" }, { "binary_version": "5.4.0-1025.26", "binary_name": "linux-iot-headers-5.4.0-1025" }, { "binary_version": "5.4.0-1025.26", "binary_name": "linux-iot-tools-5.4.0-1025" }, { "binary_version": "5.4.0-1025.26", "binary_name": "linux-iot-tools-common" }, { "binary_version": "5.4.0-1025.26", "binary_name": "linux-modules-5.4.0-1025-iot" }, { "binary_version": "5.4.0-1025.26", "binary_name": "linux-tools-5.4.0-1025-iot" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.4.0-1102.108", "binary_name": "linux-buildinfo-5.4.0-1102-kvm" }, { "binary_version": "5.4.0-1102.108", "binary_name": "linux-headers-5.4.0-1102-kvm" }, { "binary_version": "5.4.0-1102.108", "binary_name": "linux-image-unsigned-5.4.0-1102-kvm" }, { "binary_version": "5.4.0-1102.108", "binary_name": "linux-image-unsigned-5.4.0-1102-kvm-dbgsym" }, { "binary_version": "5.4.0-1102.108", "binary_name": "linux-kvm-headers-5.4.0-1102" }, { "binary_version": "5.4.0-1102.108", "binary_name": "linux-kvm-tools-5.4.0-1102" }, { "binary_version": "5.4.0-1102.108", "binary_name": "linux-modules-5.4.0-1102-kvm" }, { "binary_version": "5.4.0-1102.108", "binary_name": "linux-tools-5.4.0-1102-kvm" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-86.95~20.04.1", "binary_name": "linux-buildinfo-5.15.0-86-lowlatency" }, { "binary_version": "5.15.0-86.95~20.04.1", "binary_name": "linux-buildinfo-5.15.0-86-lowlatency-64k" }, { "binary_version": "5.15.0-86.95~20.04.1", "binary_name": "linux-cloud-tools-5.15.0-86-lowlatency" }, { "binary_version": "5.15.0-86.95~20.04.1", "binary_name": "linux-headers-5.15.0-86-lowlatency" }, { "binary_version": "5.15.0-86.95~20.04.1", "binary_name": "linux-headers-5.15.0-86-lowlatency-64k" }, { "binary_version": "5.15.0-86.95~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-86-lowlatency" }, { "binary_version": "5.15.0-86.95~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-86-lowlatency-64k" }, { "binary_version": "5.15.0-86.95~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-86-lowlatency-64k-dbgsym" }, { "binary_version": "5.15.0-86.95~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-86-lowlatency-dbgsym" }, { "binary_version": "5.15.0-86.95~20.04.1", "binary_name": "linux-lowlatency-hwe-5.15-cloud-tools-5.15.0-86" }, { "binary_version": "5.15.0-86.95~20.04.1", "binary_name": "linux-lowlatency-hwe-5.15-cloud-tools-common" }, { "binary_version": "5.15.0-86.95~20.04.1", "binary_name": "linux-lowlatency-hwe-5.15-headers-5.15.0-86" }, { "binary_version": "5.15.0-86.95~20.04.1", "binary_name": "linux-lowlatency-hwe-5.15-tools-5.15.0-86" }, { "binary_version": "5.15.0-86.95~20.04.1", "binary_name": "linux-lowlatency-hwe-5.15-tools-common" }, { "binary_version": "5.15.0-86.95~20.04.1", "binary_name": "linux-lowlatency-hwe-5.15-tools-host" }, { "binary_version": "5.15.0-86.95~20.04.1", "binary_name": "linux-modules-5.15.0-86-lowlatency" }, { "binary_version": "5.15.0-86.95~20.04.1", "binary_name": "linux-modules-5.15.0-86-lowlatency-64k" }, { "binary_version": "5.15.0-86.95~20.04.1", "binary_name": "linux-modules-iwlwifi-5.15.0-86-lowlatency" }, { "binary_version": "5.15.0-86.95~20.04.1", "binary_name": "linux-tools-5.15.0-86-lowlatency" }, { "binary_version": "5.15.0-86.95~20.04.1", "binary_name": "linux-tools-5.15.0-86-lowlatency-64k" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1018.18~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1018-nvidia-tegra" }, { "binary_version": "5.15.0-1018.18~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1018-nvidia-tegra-rt" }, { "binary_version": "5.15.0-1018.18~20.04.1", "binary_name": "linux-headers-5.15.0-1018-nvidia-tegra" }, { "binary_version": "5.15.0-1018.18~20.04.1", "binary_name": "linux-headers-5.15.0-1018-nvidia-tegra-rt" }, { "binary_version": "5.15.0-1018.18~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1018-nvidia-tegra" }, { "binary_version": "5.15.0-1018.18~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1018-nvidia-tegra-dbgsym" }, { "binary_version": "5.15.0-1018.18~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1018-nvidia-tegra-rt" }, { "binary_version": "5.15.0-1018.18~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1018-nvidia-tegra-rt-dbgsym" }, { "binary_version": "5.15.0-1018.18~20.04.1", "binary_name": "linux-modules-5.15.0-1018-nvidia-tegra" }, { "binary_version": "5.15.0-1018.18~20.04.1", "binary_name": "linux-modules-5.15.0-1018-nvidia-tegra-rt" }, { "binary_version": "5.15.0-1018.18~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1018-nvidia-tegra" }, { "binary_version": "5.15.0-1018.18~20.04.1", "binary_name": "linux-nvidia-tegra-5.15-cloud-tools-common" }, { "binary_version": "5.15.0-1018.18~20.04.1", "binary_name": "linux-nvidia-tegra-5.15-headers-5.15.0-1018" }, { "binary_version": "5.15.0-1018.18~20.04.1", "binary_name": "linux-nvidia-tegra-5.15-tools-5.15.0-1018" }, { "binary_version": "5.15.0-1018.18~20.04.1", "binary_name": "linux-nvidia-tegra-5.15-tools-common" }, { "binary_version": "5.15.0-1018.18~20.04.1", "binary_name": "linux-nvidia-tegra-5.15-tools-host" }, { "binary_version": "5.15.0-1018.18~20.04.1", "binary_name": "linux-tools-5.15.0-1018-nvidia-tegra" }, { "binary_version": "5.15.0-1018.18~20.04.1", "binary_name": "linux-tools-5.15.0-1018-nvidia-tegra-rt" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.4.0-1112.121", "binary_name": "linux-buildinfo-5.4.0-1112-oracle" }, { "binary_version": "5.4.0-1112.121", "binary_name": "linux-headers-5.4.0-1112-oracle" }, { "binary_version": "5.4.0-1112.121", "binary_name": "linux-image-unsigned-5.4.0-1112-oracle" }, { "binary_version": "5.4.0-1112.121", "binary_name": "linux-image-unsigned-5.4.0-1112-oracle-dbgsym" }, { "binary_version": "5.4.0-1112.121", "binary_name": "linux-modules-5.4.0-1112-oracle" }, { "binary_version": "5.4.0-1112.121", "binary_name": "linux-modules-extra-5.4.0-1112-oracle" }, { "binary_version": "5.4.0-1112.121", "binary_name": "linux-oracle-headers-5.4.0-1112" }, { "binary_version": "5.4.0-1112.121", "binary_name": "linux-oracle-tools-5.4.0-1112" }, { "binary_version": "5.4.0-1112.121", "binary_name": "linux-tools-5.4.0-1112-oracle" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1045.51~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1045-oracle" }, { "binary_version": "5.15.0-1045.51~20.04.1", "binary_name": "linux-headers-5.15.0-1045-oracle" }, { "binary_version": "5.15.0-1045.51~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1045-oracle" }, { "binary_version": "5.15.0-1045.51~20.04.1", "binary_name": "linux-image-unsigned-5.15.0-1045-oracle-dbgsym" }, { "binary_version": "5.15.0-1045.51~20.04.1", "binary_name": "linux-modules-5.15.0-1045-oracle" }, { "binary_version": "5.15.0-1045.51~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1045-oracle" }, { "binary_version": "5.15.0-1045.51~20.04.1", "binary_name": "linux-oracle-5.15-headers-5.15.0-1045" }, { "binary_version": "5.15.0-1045.51~20.04.1", "binary_name": "linux-oracle-5.15-tools-5.15.0-1045" }, { "binary_version": "5.15.0-1045.51~20.04.1", "binary_name": "linux-tools-5.15.0-1045-oracle" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.4.0-1097.109", "binary_name": "linux-buildinfo-5.4.0-1097-raspi" }, { "binary_version": "5.4.0-1097.109", "binary_name": "linux-headers-5.4.0-1097-raspi" }, { "binary_version": "5.4.0-1097.109", "binary_name": "linux-image-5.4.0-1097-raspi" }, { "binary_version": "5.4.0-1097.109", "binary_name": "linux-image-5.4.0-1097-raspi-dbgsym" }, { "binary_version": "5.4.0-1097.109", "binary_name": "linux-modules-5.4.0-1097-raspi" }, { "binary_version": "5.4.0-1097.109", "binary_name": "linux-raspi-headers-5.4.0-1097" }, { "binary_version": "5.4.0-1097.109", "binary_name": "linux-raspi-tools-5.4.0-1097" }, { "binary_version": "5.4.0-1097.109", "binary_name": "linux-tools-5.4.0-1097-raspi" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1043.47~20.04.1", "binary_name": "linux-buildinfo-5.15.0-1043-generic" }, { "binary_version": "5.15.0-1043.47~20.04.1", "binary_name": "linux-headers-5.15.0-1043-generic" }, { "binary_version": "5.15.0-1043.47~20.04.1", "binary_name": "linux-image-5.15.0-1043-generic" }, { "binary_version": "5.15.0-1043.47~20.04.1", "binary_name": "linux-image-5.15.0-1043-generic-dbgsym" }, { "binary_version": "5.15.0-1043.47~20.04.1", "binary_name": "linux-modules-5.15.0-1043-generic" }, { "binary_version": "5.15.0-1043.47~20.04.1", "binary_name": "linux-modules-extra-5.15.0-1043-generic" }, { "binary_version": "5.15.0-1043.47~20.04.1", "binary_name": "linux-riscv-5.15-headers-5.15.0-1043" }, { "binary_version": "5.15.0-1043.47~20.04.1", "binary_name": "linux-riscv-5.15-tools-5.15.0-1043" }, { "binary_version": "5.15.0-1043.47~20.04.1", "binary_name": "linux-tools-5.15.0-1043-generic" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.4.0-1033.37", "binary_name": "linux-buildinfo-5.4.0-1033-xilinx-zynqmp" }, { "binary_version": "5.4.0-1033.37", "binary_name": "linux-headers-5.4.0-1033-xilinx-zynqmp" }, { "binary_version": "5.4.0-1033.37", "binary_name": "linux-image-5.4.0-1033-xilinx-zynqmp" }, { "binary_version": "5.4.0-1033.37", "binary_name": "linux-image-5.4.0-1033-xilinx-zynqmp-dbgsym" }, { "binary_version": "5.4.0-1033.37", "binary_name": "linux-modules-5.4.0-1033-xilinx-zynqmp" }, { "binary_version": "5.4.0-1033.37", "binary_name": "linux-tools-5.4.0-1033-xilinx-zynqmp" }, { "binary_version": "5.4.0-1033.37", "binary_name": "linux-xilinx-zynqmp-headers-5.4.0-1033" }, { "binary_version": "5.4.0-1033.37", "binary_name": "linux-xilinx-zynqmp-tools-5.4.0-1033" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.4.0-1113.123+fips1", "binary_name": "linux-aws-fips-headers-5.4.0-1113" }, { "binary_version": "5.4.0-1113.123+fips1", "binary_name": "linux-aws-fips-tools-5.4.0-1113" }, { "binary_version": "5.4.0-1113.123+fips1", "binary_name": "linux-buildinfo-5.4.0-1113-aws-fips" }, { "binary_version": "5.4.0-1113.123+fips1", "binary_name": "linux-headers-5.4.0-1113-aws-fips" }, { "binary_version": "5.4.0-1113.123+fips1", "binary_name": "linux-image-unsigned-5.4.0-1113-aws-fips" }, { "binary_version": "5.4.0-1113.123+fips1", "binary_name": "linux-image-unsigned-5.4.0-1113-aws-fips-dbgsym" }, { "binary_version": "5.4.0-1113.123+fips1", "binary_name": "linux-image-unsigned-hmac-5.4.0-1113-aws-fips" }, { "binary_version": "5.4.0-1113.123+fips1", "binary_name": "linux-modules-5.4.0-1113-aws-fips" }, { "binary_version": "5.4.0-1113.123+fips1", "binary_name": "linux-modules-extra-5.4.0-1113-aws-fips" }, { "binary_version": "5.4.0-1113.123+fips1", "binary_name": "linux-tools-5.4.0-1113-aws-fips" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.4.0-1119.126+fips1", "binary_name": "linux-azure-fips-cloud-tools-5.4.0-1119" }, { "binary_version": "5.4.0-1119.126+fips1", "binary_name": "linux-azure-fips-headers-5.4.0-1119" }, { "binary_version": "5.4.0-1119.126+fips1", "binary_name": "linux-azure-fips-tools-5.4.0-1119" }, { "binary_version": "5.4.0-1119.126+fips1", "binary_name": "linux-buildinfo-5.4.0-1119-azure-fips" }, { "binary_version": "5.4.0-1119.126+fips1", "binary_name": "linux-cloud-tools-5.4.0-1119-azure-fips" }, { "binary_version": "5.4.0-1119.126+fips1", "binary_name": "linux-headers-5.4.0-1119-azure-fips" }, { "binary_version": "5.4.0-1119.126+fips1", "binary_name": "linux-image-unsigned-5.4.0-1119-azure-fips" }, { "binary_version": "5.4.0-1119.126+fips1", "binary_name": "linux-image-unsigned-5.4.0-1119-azure-fips-dbgsym" }, { "binary_version": "5.4.0-1119.126+fips1", "binary_name": "linux-image-unsigned-hmac-5.4.0-1119-azure-fips" }, { "binary_version": "5.4.0-1119.126+fips1", "binary_name": "linux-modules-5.4.0-1119-azure-fips" }, { "binary_version": "5.4.0-1119.126+fips1", "binary_name": "linux-modules-extra-5.4.0-1119-azure-fips" }, { "binary_version": "5.4.0-1119.126+fips1", "binary_name": "linux-tools-5.4.0-1119-azure-fips" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.4.0-1088.97", "binary_name": "linux-buildinfo-5.4.0-1088-fips" }, { "binary_version": "5.4.0-1088.97", "binary_name": "linux-fips-headers-5.4.0-1088" }, { "binary_version": "5.4.0-1088.97", "binary_name": "linux-fips-tools-5.4.0-1088" }, { "binary_version": "5.4.0-1088.97", "binary_name": "linux-fips-tools-host" }, { "binary_version": "5.4.0-1088.97", "binary_name": "linux-headers-5.4.0-1088-fips" }, { "binary_version": "5.4.0-1088.97", "binary_name": "linux-image-unsigned-5.4.0-1088-fips" }, { "binary_version": "5.4.0-1088.97", "binary_name": "linux-image-unsigned-5.4.0-1088-fips-dbgsym" }, { "binary_version": "5.4.0-1088.97", "binary_name": "linux-image-unsigned-hmac-5.4.0-1088-fips" }, { "binary_version": "5.4.0-1088.97", "binary_name": "linux-modules-5.4.0-1088-fips" }, { "binary_version": "5.4.0-1088.97", "binary_name": "linux-modules-extra-5.4.0-1088-fips" }, { "binary_version": "5.4.0-1088.97", "binary_name": "linux-tools-5.4.0-1088-fips" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.4.0-1117.126+fips1", "binary_name": "linux-buildinfo-5.4.0-1117-gcp-fips" }, { "binary_version": "5.4.0-1117.126+fips1", "binary_name": "linux-gcp-fips-headers-5.4.0-1117" }, { "binary_version": "5.4.0-1117.126+fips1", "binary_name": "linux-gcp-fips-tools-5.4.0-1117" }, { "binary_version": "5.4.0-1117.126+fips1", "binary_name": "linux-headers-5.4.0-1117-gcp-fips" }, { "binary_version": "5.4.0-1117.126+fips1", "binary_name": "linux-image-unsigned-5.4.0-1117-gcp-fips" }, { "binary_version": "5.4.0-1117.126+fips1", "binary_name": "linux-image-unsigned-5.4.0-1117-gcp-fips-dbgsym" }, { "binary_version": "5.4.0-1117.126+fips1", "binary_name": "linux-image-unsigned-hmac-5.4.0-1117-gcp-fips" }, { "binary_version": "5.4.0-1117.126+fips1", "binary_name": "linux-modules-5.4.0-1117-gcp-fips" }, { "binary_version": "5.4.0-1117.126+fips1", "binary_name": "linux-modules-extra-5.4.0-1117-gcp-fips" }, { "binary_version": "5.4.0-1117.126+fips1", "binary_name": "linux-tools-5.4.0-1117-gcp-fips" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-86.96", "binary_name": "linux-buildinfo-5.15.0-86-generic" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-buildinfo-5.15.0-86-generic-64k" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-buildinfo-5.15.0-86-generic-lpae" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-cloud-tools-5.15.0-86" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-cloud-tools-5.15.0-86-generic" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-cloud-tools-common" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-doc" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-headers-5.15.0-86" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-headers-5.15.0-86-generic" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-headers-5.15.0-86-generic-64k" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-headers-5.15.0-86-generic-lpae" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-image-5.15.0-86-generic" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-image-5.15.0-86-generic-dbgsym" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-image-5.15.0-86-generic-lpae" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-image-5.15.0-86-generic-lpae-dbgsym" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-image-unsigned-5.15.0-86-generic" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-image-unsigned-5.15.0-86-generic-64k" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-image-unsigned-5.15.0-86-generic-64k-dbgsym" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-image-unsigned-5.15.0-86-generic-dbgsym" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-libc-dev" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-modules-5.15.0-86-generic" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-modules-5.15.0-86-generic-64k" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-modules-5.15.0-86-generic-lpae" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-modules-extra-5.15.0-86-generic" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-modules-iwlwifi-5.15.0-86-generic" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-source-5.15.0" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-tools-5.15.0-86" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-tools-5.15.0-86-generic" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-tools-5.15.0-86-generic-64k" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-tools-5.15.0-86-generic-lpae" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-tools-common" }, { "binary_version": "5.15.0-86.96", "binary_name": "linux-tools-host" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1047.52", "binary_name": "linux-aws-cloud-tools-5.15.0-1047" }, { "binary_version": "5.15.0-1047.52", "binary_name": "linux-aws-headers-5.15.0-1047" }, { "binary_version": "5.15.0-1047.52", "binary_name": "linux-aws-tools-5.15.0-1047" }, { "binary_version": "5.15.0-1047.52", "binary_name": "linux-buildinfo-5.15.0-1047-aws" }, { "binary_version": "5.15.0-1047.52", "binary_name": "linux-cloud-tools-5.15.0-1047-aws" }, { "binary_version": "5.15.0-1047.52", "binary_name": "linux-headers-5.15.0-1047-aws" }, { "binary_version": "5.15.0-1047.52", "binary_name": "linux-image-unsigned-5.15.0-1047-aws" }, { "binary_version": "5.15.0-1047.52", "binary_name": "linux-image-unsigned-5.15.0-1047-aws-dbgsym" }, { "binary_version": "5.15.0-1047.52", "binary_name": "linux-modules-5.15.0-1047-aws" }, { "binary_version": "5.15.0-1047.52", "binary_name": "linux-modules-extra-5.15.0-1047-aws" }, { "binary_version": "5.15.0-1047.52", "binary_name": "linux-tools-5.15.0-1047-aws" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1049.56", "binary_name": "linux-azure-cloud-tools-5.15.0-1049" }, { "binary_version": "5.15.0-1049.56", "binary_name": "linux-azure-headers-5.15.0-1049" }, { "binary_version": "5.15.0-1049.56", "binary_name": "linux-azure-tools-5.15.0-1049" }, { "binary_version": "5.15.0-1049.56", "binary_name": "linux-buildinfo-5.15.0-1049-azure" }, { "binary_version": "5.15.0-1049.56", "binary_name": "linux-cloud-tools-5.15.0-1049-azure" }, { "binary_version": "5.15.0-1049.56", "binary_name": "linux-headers-5.15.0-1049-azure" }, { "binary_version": "5.15.0-1049.56", "binary_name": "linux-image-unsigned-5.15.0-1049-azure" }, { "binary_version": "5.15.0-1049.56", "binary_name": "linux-image-unsigned-5.15.0-1049-azure-dbgsym" }, { "binary_version": "5.15.0-1049.56", "binary_name": "linux-modules-5.15.0-1049-azure" }, { "binary_version": "5.15.0-1049.56", "binary_name": "linux-modules-extra-5.15.0-1049-azure" }, { "binary_version": "5.15.0-1049.56", "binary_name": "linux-tools-5.15.0-1049-azure" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1049.56.1", "binary_name": "linux-image-unsigned-5.15.0-1049-azure-fde" }, { "binary_version": "5.15.0-1049.56.1", "binary_name": "linux-image-unsigned-5.15.0-1049-azure-fde-dbgsym" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1044.52", "binary_name": "linux-buildinfo-5.15.0-1044-gcp" }, { "binary_version": "5.15.0-1044.52", "binary_name": "linux-gcp-headers-5.15.0-1044" }, { "binary_version": "5.15.0-1044.52", "binary_name": "linux-gcp-tools-5.15.0-1044" }, { "binary_version": "5.15.0-1044.52", "binary_name": "linux-headers-5.15.0-1044-gcp" }, { "binary_version": "5.15.0-1044.52", "binary_name": "linux-image-unsigned-5.15.0-1044-gcp" }, { "binary_version": "5.15.0-1044.52", "binary_name": "linux-image-unsigned-5.15.0-1044-gcp-dbgsym" }, { "binary_version": "5.15.0-1044.52", "binary_name": "linux-modules-5.15.0-1044-gcp" }, { "binary_version": "5.15.0-1044.52", "binary_name": "linux-modules-extra-5.15.0-1044-gcp" }, { "binary_version": "5.15.0-1044.52", "binary_name": "linux-modules-iwlwifi-5.15.0-1044-gcp" }, { "binary_version": "5.15.0-1044.52", "binary_name": "linux-tools-5.15.0-1044-gcp" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1044.49", "binary_name": "linux-buildinfo-5.15.0-1044-gke" }, { "binary_version": "5.15.0-1044.49", "binary_name": "linux-gke-headers-5.15.0-1044" }, { "binary_version": "5.15.0-1044.49", "binary_name": "linux-gke-tools-5.15.0-1044" }, { "binary_version": "5.15.0-1044.49", "binary_name": "linux-headers-5.15.0-1044-gke" }, { "binary_version": "5.15.0-1044.49", "binary_name": "linux-image-unsigned-5.15.0-1044-gke" }, { "binary_version": "5.15.0-1044.49", "binary_name": "linux-image-unsigned-5.15.0-1044-gke-dbgsym" }, { "binary_version": "5.15.0-1044.49", "binary_name": "linux-modules-5.15.0-1044-gke" }, { "binary_version": "5.15.0-1044.49", "binary_name": "linux-modules-extra-5.15.0-1044-gke" }, { "binary_version": "5.15.0-1044.49", "binary_name": "linux-modules-iwlwifi-5.15.0-1044-gke" }, { "binary_version": "5.15.0-1044.49", "binary_name": "linux-tools-5.15.0-1044-gke" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1030.35", "binary_name": "linux-buildinfo-5.15.0-1030-gkeop" }, { "binary_version": "5.15.0-1030.35", "binary_name": "linux-cloud-tools-5.15.0-1030-gkeop" }, { "binary_version": "5.15.0-1030.35", "binary_name": "linux-gkeop-cloud-tools-5.15.0-1030" }, { "binary_version": "5.15.0-1030.35", "binary_name": "linux-gkeop-headers-5.15.0-1030" }, { "binary_version": "5.15.0-1030.35", "binary_name": "linux-gkeop-tools-5.15.0-1030" }, { "binary_version": "5.15.0-1030.35", "binary_name": "linux-headers-5.15.0-1030-gkeop" }, { "binary_version": "5.15.0-1030.35", "binary_name": "linux-image-unsigned-5.15.0-1030-gkeop" }, { "binary_version": "5.15.0-1030.35", "binary_name": "linux-image-unsigned-5.15.0-1030-gkeop-dbgsym" }, { "binary_version": "5.15.0-1030.35", "binary_name": "linux-modules-5.15.0-1030-gkeop" }, { "binary_version": "5.15.0-1030.35", "binary_name": "linux-modules-extra-5.15.0-1030-gkeop" }, { "binary_version": "5.15.0-1030.35", "binary_name": "linux-tools-5.15.0-1030-gkeop" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1040.43", "binary_name": "linux-buildinfo-5.15.0-1040-ibm" }, { "binary_version": "5.15.0-1040.43", "binary_name": "linux-headers-5.15.0-1040-ibm" }, { "binary_version": "5.15.0-1040.43", "binary_name": "linux-ibm-cloud-tools-common" }, { "binary_version": "5.15.0-1040.43", "binary_name": "linux-ibm-headers-5.15.0-1040" }, { "binary_version": "5.15.0-1040.43", "binary_name": "linux-ibm-source-5.15.0" }, { "binary_version": "5.15.0-1040.43", "binary_name": "linux-ibm-tools-5.15.0-1040" }, { "binary_version": "5.15.0-1040.43", "binary_name": "linux-ibm-tools-common" }, { "binary_version": "5.15.0-1040.43", "binary_name": "linux-image-unsigned-5.15.0-1040-ibm" }, { "binary_version": "5.15.0-1040.43", "binary_name": "linux-image-unsigned-5.15.0-1040-ibm-dbgsym" }, { "binary_version": "5.15.0-1040.43", "binary_name": "linux-modules-5.15.0-1040-ibm" }, { "binary_version": "5.15.0-1040.43", "binary_name": "linux-modules-extra-5.15.0-1040-ibm" }, { "binary_version": "5.15.0-1040.43", "binary_name": "linux-tools-5.15.0-1040-ibm" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1043.49", "binary_name": "linux-buildinfo-5.15.0-1043-intel-iotg" }, { "binary_version": "5.15.0-1043.49", "binary_name": "linux-cloud-tools-5.15.0-1043-intel-iotg" }, { "binary_version": "5.15.0-1043.49", "binary_name": "linux-headers-5.15.0-1043-intel-iotg" }, { "binary_version": "5.15.0-1043.49", "binary_name": "linux-image-unsigned-5.15.0-1043-intel-iotg" }, { "binary_version": "5.15.0-1043.49", "binary_name": "linux-image-unsigned-5.15.0-1043-intel-iotg-dbgsym" }, { "binary_version": "5.15.0-1043.49", "binary_name": "linux-intel-iotg-cloud-tools-5.15.0-1043" }, { "binary_version": "5.15.0-1043.49", "binary_name": "linux-intel-iotg-cloud-tools-common" }, { "binary_version": "5.15.0-1043.49", "binary_name": "linux-intel-iotg-headers-5.15.0-1043" }, { "binary_version": "5.15.0-1043.49", "binary_name": "linux-intel-iotg-tools-5.15.0-1043" }, { "binary_version": "5.15.0-1043.49", "binary_name": "linux-intel-iotg-tools-common" }, { "binary_version": "5.15.0-1043.49", "binary_name": "linux-intel-iotg-tools-host" }, { "binary_version": "5.15.0-1043.49", "binary_name": "linux-modules-5.15.0-1043-intel-iotg" }, { "binary_version": "5.15.0-1043.49", "binary_name": "linux-modules-extra-5.15.0-1043-intel-iotg" }, { "binary_version": "5.15.0-1043.49", "binary_name": "linux-modules-iwlwifi-5.15.0-1043-intel-iotg" }, { "binary_version": "5.15.0-1043.49", "binary_name": "linux-tools-5.15.0-1043-intel-iotg" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1044.49", "binary_name": "linux-buildinfo-5.15.0-1044-kvm" }, { "binary_version": "5.15.0-1044.49", "binary_name": "linux-headers-5.15.0-1044-kvm" }, { "binary_version": "5.15.0-1044.49", "binary_name": "linux-image-unsigned-5.15.0-1044-kvm" }, { "binary_version": "5.15.0-1044.49", "binary_name": "linux-image-unsigned-5.15.0-1044-kvm-dbgsym" }, { "binary_version": "5.15.0-1044.49", "binary_name": "linux-kvm-headers-5.15.0-1044" }, { "binary_version": "5.15.0-1044.49", "binary_name": "linux-kvm-tools-5.15.0-1044" }, { "binary_version": "5.15.0-1044.49", "binary_name": "linux-modules-5.15.0-1044-kvm" }, { "binary_version": "5.15.0-1044.49", "binary_name": "linux-tools-5.15.0-1044-kvm" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-86.95", "binary_name": "linux-buildinfo-5.15.0-86-lowlatency" }, { "binary_version": "5.15.0-86.95", "binary_name": "linux-buildinfo-5.15.0-86-lowlatency-64k" }, { "binary_version": "5.15.0-86.95", "binary_name": "linux-cloud-tools-5.15.0-86-lowlatency" }, { "binary_version": "5.15.0-86.95", "binary_name": "linux-headers-5.15.0-86-lowlatency" }, { "binary_version": "5.15.0-86.95", "binary_name": "linux-headers-5.15.0-86-lowlatency-64k" }, { "binary_version": "5.15.0-86.95", "binary_name": "linux-image-unsigned-5.15.0-86-lowlatency" }, { "binary_version": "5.15.0-86.95", "binary_name": "linux-image-unsigned-5.15.0-86-lowlatency-64k" }, { "binary_version": "5.15.0-86.95", "binary_name": "linux-image-unsigned-5.15.0-86-lowlatency-64k-dbgsym" }, { "binary_version": "5.15.0-86.95", "binary_name": "linux-image-unsigned-5.15.0-86-lowlatency-dbgsym" }, { "binary_version": "5.15.0-86.95", "binary_name": "linux-lowlatency-cloud-tools-5.15.0-86" }, { "binary_version": "5.15.0-86.95", "binary_name": "linux-lowlatency-cloud-tools-common" }, { "binary_version": "5.15.0-86.95", "binary_name": "linux-lowlatency-headers-5.15.0-86" }, { "binary_version": "5.15.0-86.95", "binary_name": "linux-lowlatency-tools-5.15.0-86" }, { "binary_version": "5.15.0-86.95", "binary_name": "linux-lowlatency-tools-common" }, { "binary_version": "5.15.0-86.95", "binary_name": "linux-lowlatency-tools-host" }, { "binary_version": "5.15.0-86.95", "binary_name": "linux-modules-5.15.0-86-lowlatency" }, { "binary_version": "5.15.0-86.95", "binary_name": "linux-modules-5.15.0-86-lowlatency-64k" }, { "binary_version": "5.15.0-86.95", "binary_name": "linux-modules-iwlwifi-5.15.0-86-lowlatency" }, { "binary_version": "5.15.0-86.95", "binary_name": "linux-tools-5.15.0-86-lowlatency" }, { "binary_version": "5.15.0-86.95", "binary_name": "linux-tools-5.15.0-86-lowlatency-64k" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1037.37", "binary_name": "linux-buildinfo-5.15.0-1037-nvidia" }, { "binary_version": "5.15.0-1037.37", "binary_name": "linux-buildinfo-5.15.0-1037-nvidia-lowlatency" }, { "binary_version": "5.15.0-1037.37", "binary_name": "linux-cloud-tools-5.15.0-1037-nvidia" }, { "binary_version": "5.15.0-1037.37", "binary_name": "linux-cloud-tools-5.15.0-1037-nvidia-lowlatency" }, { "binary_version": "5.15.0-1037.37", "binary_name": "linux-headers-5.15.0-1037-nvidia" }, { "binary_version": "5.15.0-1037.37", "binary_name": "linux-headers-5.15.0-1037-nvidia-lowlatency" }, { "binary_version": "5.15.0-1037.37", "binary_name": "linux-image-unsigned-5.15.0-1037-nvidia" }, { "binary_version": "5.15.0-1037.37", "binary_name": "linux-image-unsigned-5.15.0-1037-nvidia-dbgsym" }, { "binary_version": "5.15.0-1037.37", "binary_name": "linux-image-unsigned-5.15.0-1037-nvidia-lowlatency" }, { "binary_version": "5.15.0-1037.37", "binary_name": "linux-image-unsigned-5.15.0-1037-nvidia-lowlatency-dbgsym" }, { "binary_version": "5.15.0-1037.37", "binary_name": "linux-modules-5.15.0-1037-nvidia" }, { "binary_version": "5.15.0-1037.37", "binary_name": "linux-modules-5.15.0-1037-nvidia-lowlatency" }, { "binary_version": "5.15.0-1037.37", "binary_name": "linux-modules-extra-5.15.0-1037-nvidia" }, { "binary_version": "5.15.0-1037.37", "binary_name": "linux-modules-nvidia-fs-5.15.0-1037-nvidia" }, { "binary_version": "5.15.0-1037.37", "binary_name": "linux-modules-nvidia-fs-5.15.0-1037-nvidia-lowlatency" }, { "binary_version": "5.15.0-1037.37", "binary_name": "linux-nvidia-cloud-tools-5.15.0-1037" }, { "binary_version": "5.15.0-1037.37", "binary_name": "linux-nvidia-cloud-tools-common" }, { "binary_version": "5.15.0-1037.37", "binary_name": "linux-nvidia-headers-5.15.0-1037" }, { "binary_version": "5.15.0-1037.37", "binary_name": "linux-nvidia-tools-5.15.0-1037" }, { "binary_version": "5.15.0-1037.37", "binary_name": "linux-nvidia-tools-common" }, { "binary_version": "5.15.0-1037.37", "binary_name": "linux-nvidia-tools-host" }, { "binary_version": "5.15.0-1037.37", "binary_name": "linux-tools-5.15.0-1037-nvidia" }, { "binary_version": "5.15.0-1037.37", "binary_name": "linux-tools-5.15.0-1037-nvidia-lowlatency" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1018.18", "binary_name": "linux-buildinfo-5.15.0-1018-nvidia-tegra" }, { "binary_version": "5.15.0-1018.18", "binary_name": "linux-buildinfo-5.15.0-1018-nvidia-tegra-rt" }, { "binary_version": "5.15.0-1018.18", "binary_name": "linux-headers-5.15.0-1018-nvidia-tegra" }, { "binary_version": "5.15.0-1018.18", "binary_name": "linux-headers-5.15.0-1018-nvidia-tegra-rt" }, { "binary_version": "5.15.0-1018.18", "binary_name": "linux-image-unsigned-5.15.0-1018-nvidia-tegra" }, { "binary_version": "5.15.0-1018.18", "binary_name": "linux-image-unsigned-5.15.0-1018-nvidia-tegra-dbgsym" }, { "binary_version": "5.15.0-1018.18", "binary_name": "linux-image-unsigned-5.15.0-1018-nvidia-tegra-rt" }, { "binary_version": "5.15.0-1018.18", "binary_name": "linux-image-unsigned-5.15.0-1018-nvidia-tegra-rt-dbgsym" }, { "binary_version": "5.15.0-1018.18", "binary_name": "linux-modules-5.15.0-1018-nvidia-tegra" }, { "binary_version": "5.15.0-1018.18", "binary_name": "linux-modules-5.15.0-1018-nvidia-tegra-rt" }, { "binary_version": "5.15.0-1018.18", "binary_name": "linux-modules-extra-5.15.0-1018-nvidia-tegra" }, { "binary_version": "5.15.0-1018.18", "binary_name": "linux-nvidia-tegra-cloud-tools-common" }, { "binary_version": "5.15.0-1018.18", "binary_name": "linux-nvidia-tegra-headers-5.15.0-1018" }, { "binary_version": "5.15.0-1018.18", "binary_name": "linux-nvidia-tegra-tools-5.15.0-1018" }, { "binary_version": "5.15.0-1018.18", "binary_name": "linux-nvidia-tegra-tools-common" }, { "binary_version": "5.15.0-1018.18", "binary_name": "linux-nvidia-tegra-tools-host" }, { "binary_version": "5.15.0-1018.18", "binary_name": "linux-tools-5.15.0-1018-nvidia-tegra" }, { "binary_version": "5.15.0-1018.18", "binary_name": "linux-tools-5.15.0-1018-nvidia-tegra-rt" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1005.5", "binary_name": "linux-buildinfo-5.15.0-1005-nvidia-tegra-igx" }, { "binary_version": "5.15.0-1005.5", "binary_name": "linux-buildinfo-5.15.0-1005-nvidia-tegra-igx-rt" }, { "binary_version": "5.15.0-1005.5", "binary_name": "linux-headers-5.15.0-1005-nvidia-tegra-igx" }, { "binary_version": "5.15.0-1005.5", "binary_name": "linux-headers-5.15.0-1005-nvidia-tegra-igx-rt" }, { "binary_version": "5.15.0-1005.5", "binary_name": "linux-image-unsigned-5.15.0-1005-nvidia-tegra-igx" }, { "binary_version": "5.15.0-1005.5", "binary_name": "linux-image-unsigned-5.15.0-1005-nvidia-tegra-igx-dbgsym" }, { "binary_version": "5.15.0-1005.5", "binary_name": "linux-image-unsigned-5.15.0-1005-nvidia-tegra-igx-rt" }, { "binary_version": "5.15.0-1005.5", "binary_name": "linux-image-unsigned-5.15.0-1005-nvidia-tegra-igx-rt-dbgsym" }, { "binary_version": "5.15.0-1005.5", "binary_name": "linux-modules-5.15.0-1005-nvidia-tegra-igx" }, { "binary_version": "5.15.0-1005.5", "binary_name": "linux-modules-5.15.0-1005-nvidia-tegra-igx-rt" }, { "binary_version": "5.15.0-1005.5", "binary_name": "linux-modules-extra-5.15.0-1005-nvidia-tegra-igx" }, { "binary_version": "5.15.0-1005.5", "binary_name": "linux-modules-tegra-igpu-igx-5.15.0-1005-nvidia-tegra-igx" }, { "binary_version": "5.15.0-1005.5", "binary_name": "linux-modules-tegra-igpu-igx-5.15.0-1005-nvidia-tegra-igx-rt" }, { "binary_version": "5.15.0-1005.5", "binary_name": "linux-nvidia-tegra-igx-cloud-tools-common" }, { "binary_version": "5.15.0-1005.5", "binary_name": "linux-nvidia-tegra-igx-headers-5.15.0-1005" }, { "binary_version": "5.15.0-1005.5", "binary_name": "linux-nvidia-tegra-igx-tools-5.15.0-1005" }, { "binary_version": "5.15.0-1005.5", "binary_name": "linux-nvidia-tegra-igx-tools-common" }, { "binary_version": "5.15.0-1005.5", "binary_name": "linux-nvidia-tegra-igx-tools-host" }, { "binary_version": "5.15.0-1005.5", "binary_name": "linux-tools-5.15.0-1005-nvidia-tegra-igx" }, { "binary_version": "5.15.0-1005.5", "binary_name": "linux-tools-5.15.0-1005-nvidia-tegra-igx-rt" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1045.51", "binary_name": "linux-buildinfo-5.15.0-1045-oracle" }, { "binary_version": "5.15.0-1045.51", "binary_name": "linux-headers-5.15.0-1045-oracle" }, { "binary_version": "5.15.0-1045.51", "binary_name": "linux-image-unsigned-5.15.0-1045-oracle" }, { "binary_version": "5.15.0-1045.51", "binary_name": "linux-image-unsigned-5.15.0-1045-oracle-dbgsym" }, { "binary_version": "5.15.0-1045.51", "binary_name": "linux-modules-5.15.0-1045-oracle" }, { "binary_version": "5.15.0-1045.51", "binary_name": "linux-modules-extra-5.15.0-1045-oracle" }, { "binary_version": "5.15.0-1045.51", "binary_name": "linux-oracle-headers-5.15.0-1045" }, { "binary_version": "5.15.0-1045.51", "binary_name": "linux-oracle-tools-5.15.0-1045" }, { "binary_version": "5.15.0-1045.51", "binary_name": "linux-tools-5.15.0-1045-oracle" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1040.43", "binary_name": "linux-buildinfo-5.15.0-1040-raspi" }, { "binary_version": "5.15.0-1040.43", "binary_name": "linux-headers-5.15.0-1040-raspi" }, { "binary_version": "5.15.0-1040.43", "binary_name": "linux-image-5.15.0-1040-raspi" }, { "binary_version": "5.15.0-1040.43", "binary_name": "linux-image-5.15.0-1040-raspi-dbgsym" }, { "binary_version": "5.15.0-1040.43", "binary_name": "linux-modules-5.15.0-1040-raspi" }, { "binary_version": "5.15.0-1040.43", "binary_name": "linux-modules-extra-5.15.0-1040-raspi" }, { "binary_version": "5.15.0-1040.43", "binary_name": "linux-raspi-headers-5.15.0-1040" }, { "binary_version": "5.15.0-1040.43", "binary_name": "linux-raspi-tools-5.15.0-1040" }, { "binary_version": "5.15.0-1040.43", "binary_name": "linux-tools-5.15.0-1040-raspi" } ] }
{ "availability": "No subscription required", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1025.29", "binary_name": "linux-buildinfo-5.15.0-1025-xilinx-zynqmp" }, { "binary_version": "5.15.0-1025.29", "binary_name": "linux-headers-5.15.0-1025-xilinx-zynqmp" }, { "binary_version": "5.15.0-1025.29", "binary_name": "linux-image-5.15.0-1025-xilinx-zynqmp" }, { "binary_version": "5.15.0-1025.29", "binary_name": "linux-image-5.15.0-1025-xilinx-zynqmp-dbgsym" }, { "binary_version": "5.15.0-1025.29", "binary_name": "linux-modules-5.15.0-1025-xilinx-zynqmp" }, { "binary_version": "5.15.0-1025.29", "binary_name": "linux-tools-5.15.0-1025-xilinx-zynqmp" }, { "binary_version": "5.15.0-1025.29", "binary_name": "linux-xilinx-zynqmp-headers-5.15.0-1025" }, { "binary_version": "5.15.0-1025.29", "binary_name": "linux-xilinx-zynqmp-tools-5.15.0-1025" }, { "binary_version": "5.15.0-1025.29", "binary_name": "linux-xilinx-zynqmp-tools-common" }, { "binary_version": "5.15.0-1025.29", "binary_name": "linux-xilinx-zynqmp-tools-host" } ] }
{ "availability": "Available for NVIDIA BlueField platforms", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1027.29", "binary_name": "linux-bluefield-cloud-tools-common" }, { "binary_version": "5.15.0-1027.29", "binary_name": "linux-bluefield-headers-5.15.0-1027" }, { "binary_version": "5.15.0-1027.29", "binary_name": "linux-bluefield-tools-5.15.0-1027" }, { "binary_version": "5.15.0-1027.29", "binary_name": "linux-bluefield-tools-host" }, { "binary_version": "5.15.0-1027.29", "binary_name": "linux-buildinfo-5.15.0-1027-bluefield" }, { "binary_version": "5.15.0-1027.29", "binary_name": "linux-headers-5.15.0-1027-bluefield" }, { "binary_version": "5.15.0-1027.29", "binary_name": "linux-image-unsigned-5.15.0-1027-bluefield" }, { "binary_version": "5.15.0-1027.29", "binary_name": "linux-image-unsigned-5.15.0-1027-bluefield-dbgsym" }, { "binary_version": "5.15.0-1027.29", "binary_name": "linux-modules-5.15.0-1027-bluefield" }, { "binary_version": "5.15.0-1027.29", "binary_name": "linux-modules-extra-5.15.0-1027-bluefield" }, { "binary_version": "5.15.0-1027.29", "binary_name": "linux-tools-5.15.0-1027-bluefield" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1040.42", "binary_name": "linux-buildinfo-5.15.0-1040-intel-iot-realtime" }, { "binary_version": "5.15.0-1040.42", "binary_name": "linux-cloud-tools-5.15.0-1040-intel-iot-realtime" }, { "binary_version": "5.15.0-1040.42", "binary_name": "linux-headers-5.15.0-1040-intel-iot-realtime" }, { "binary_version": "5.15.0-1040.42", "binary_name": "linux-image-unsigned-5.15.0-1040-intel-iot-realtime" }, { "binary_version": "5.15.0-1040.42", "binary_name": "linux-image-unsigned-5.15.0-1040-intel-iot-realtime-dbgsym" }, { "binary_version": "5.15.0-1040.42", "binary_name": "linux-intel-iot-realtime-cloud-tools-5.15.0-1040" }, { "binary_version": "5.15.0-1040.42", "binary_name": "linux-intel-iot-realtime-cloud-tools-common" }, { "binary_version": "5.15.0-1040.42", "binary_name": "linux-intel-iot-realtime-headers-5.15.0-1040" }, { "binary_version": "5.15.0-1040.42", "binary_name": "linux-intel-iot-realtime-tools-5.15.0-1040" }, { "binary_version": "5.15.0-1040.42", "binary_name": "linux-intel-iot-realtime-tools-common" }, { "binary_version": "5.15.0-1040.42", "binary_name": "linux-intel-iot-realtime-tools-host" }, { "binary_version": "5.15.0-1040.42", "binary_name": "linux-modules-5.15.0-1040-intel-iot-realtime" }, { "binary_version": "5.15.0-1040.42", "binary_name": "linux-modules-extra-5.15.0-1040-intel-iot-realtime" }, { "binary_version": "5.15.0-1040.42", "binary_name": "linux-tools-5.15.0-1040-intel-iot-realtime" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "priority_reason": "The vulnerability is a use-after-free (read) that can be triggered remotely by winning a race condition. This can highly impact both confidentiality and availability.", "binaries": [ { "binary_version": "5.15.0-1048.54", "binary_name": "linux-buildinfo-5.15.0-1048-realtime" }, { "binary_version": "5.15.0-1048.54", "binary_name": "linux-cloud-tools-5.15.0-1048-realtime" }, { "binary_version": "5.15.0-1048.54", "binary_name": "linux-headers-5.15.0-1048-realtime" }, { "binary_version": "5.15.0-1048.54", "binary_name": "linux-image-unsigned-5.15.0-1048-realtime" }, { "binary_version": "5.15.0-1048.54", "binary_name": "linux-image-unsigned-5.15.0-1048-realtime-dbgsym" }, { "binary_version": "5.15.0-1048.54", "binary_name": "linux-modules-5.15.0-1048-realtime" }, { "binary_version": "5.15.0-1048.54", "binary_name": "linux-modules-extra-5.15.0-1048-realtime" }, { "binary_version": "5.15.0-1048.54", "binary_name": "linux-realtime-cloud-tools-5.15.0-1048" }, { "binary_version": "5.15.0-1048.54", "binary_name": "linux-realtime-cloud-tools-common" }, { "binary_version": "5.15.0-1048.54", "binary_name": "linux-realtime-headers-5.15.0-1048" }, { "binary_version": "5.15.0-1048.54", "binary_name": "linux-realtime-tools-5.15.0-1048" }, { "binary_version": "5.15.0-1048.54", "binary_name": "linux-realtime-tools-common" }, { "binary_version": "5.15.0-1048.54", "binary_name": "linux-realtime-tools-host" }, { "binary_version": "5.15.0-1048.54", "binary_name": "linux-tools-5.15.0-1048-realtime" } ] }